up.time 7.5.0 XSS And CSRF Add Admin Exploit
Title: up.time 7.5.0 XSS And CSRF Add Admin Exploit
Advisory ID: ZSL-2015-5252
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 19.08.2015
Apache/2.2.29 (Win64) mod_ssl/2.2.29 OpenSSL/1.0.1j PHP/5.4.34
[06.08.2015] Vendor contacted.
[18.08.2015] No response from the vendor.
[19.08.2015] Public security advisory released.
[2] http://cxsecurity.com/issue/WLB-2015080119
[3] https://www.exploit-db.com/exploits/37886/
[4] https://packetstormsecurity.com/files/133253
[5] https://exchange.xforce.ibmcloud.com/vulnerabilities/105835
[6] https://exchange.xforce.ibmcloud.com/vulnerabilities/105834
[13.09.2015] - Added reference [2], [3], [4], [5] and [6]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2015-5252
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 19.08.2015
Summary
The next-generation of IT monitoring software.Description
The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Multiple cross-site scripting vulnerabilities were also discovered. The issue is triggered when input passed via the multiple parameters is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.Vendor
Idera Inc. - http://www.uptimesoftware.comAffected Version
7.5.0 (build 16) and 7.4.0 (build 13)Tested On
Jetty, PHP/5.4.34, MySQLApache/2.2.29 (Win64) mod_ssl/2.2.29 OpenSSL/1.0.1j PHP/5.4.34
Vendor Status
[29.07.2015] Vulnerability discovered.[06.08.2015] Vendor contacted.
[18.08.2015] No response from the vendor.
[19.08.2015] Public security advisory released.
PoC
uptime_csrfxss.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5254.php[2] http://cxsecurity.com/issue/WLB-2015080119
[3] https://www.exploit-db.com/exploits/37886/
[4] https://packetstormsecurity.com/files/133253
[5] https://exchange.xforce.ibmcloud.com/vulnerabilities/105835
[6] https://exchange.xforce.ibmcloud.com/vulnerabilities/105834
Changelog
[19.08.2015] - Initial release[13.09.2015] - Added reference [2], [3], [4], [5] and [6]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk