Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Imperva SecureSphere management GUI contains an XSS vulnerability
Informations
Name VU#567774 First vendor Publication 2011-05-31
Vendor VU-CERT Last vendor Modification 2011-05-31
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#567774

Imperva SecureSphere management GUI contains an XSS vulnerability

Overview

An XSS vulnerability exists in the Imperva SecureSphere management GUI.

I. Description

Dell SecureWorks'SWRX-2011-001 advisory states:

"A vulnerability exists in Imperva SecureSphere due to improper validation of user-controlled input. User-controllable input is not properly sanitized for illegal or malicious content prior to being stored and later returned to an administrator in dynamically generated web content. Remote attackers could leverage this issue to conduct persistent cross-site scripting attacks. When the malicious content is viewed, arbitrary script or HTML code injected into the affected database field will be executed in the SecureSphere administrative user’s browser session in the security context of the SecureSphere administrative GUI. Successful exploitation may aid an attacker in retrieving session cookies, stealing recently submitted data, or launching further attacks."

Additional details can be found in Imperva's advisory, Imperva Security Response for CVE-2011-0767.

II. Impact

An attacker may be able to execute arbitrary script in the security context of the user's browser session accessing the management GUI.

III. Solution

Apply an Update

The following patches should be applied to the relevant SecureSphere version:

  • SecureSphere 6.2 Releases 6442-6463 Patch 30
  • SecureSphere 7.0 Releases 7061-7078 Patch 22
  • SecureSphere 7.5 Release 7564 Patch 10
  • SecureSphere 8.0 Release 8265 Patch 3
  • SecureSphere 8.5 Release 8.5 Patch 1

    These patches can be downloaded from Imperva's FTP site. Imperva credentials are required to access the FTP site.

    Vendor Information

    VendorStatusDate NotifiedDate Updated
    Imperva, Inc.Affected2011-05-31

    References

    http://www.secureworks.com/research/advisories/SWRX-2011-001/
    http://www.imperva.com/resources/adc/adc_advisories_response_secureworks.html
    http://app.demand.imperva.com/e/er.aspx?s=466&lid=794&elq=fd4f3793140c4eb8b440d242b3d56e7a

    Credit

    Thanks to Sean Talbot of Dell SecureWorks for reporting this vulnerability.

    This document was written by Jared Allar.

    Other Information

    Date Public:2011-05-23
    Date First Published:2011-05-31
    Date Last Updated:2011-05-31
    CERT Advisory: 
    CVE-ID(s):CVE-2011-0767
    NVD-ID(s):CVE-2011-0767
    US-CERT Technical Alerts: 
    Severity Metric:1.61
    Document Revision:13
  • Original Source

    Url : http://www.kb.cert.org/vuls/id/567774

    CWE : Common Weakness Enumeration

    % Id Name
    100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

    CPE : Common Platform Enumeration

    TypeDescriptionCount
    Application 7

    Open Source Vulnerability Database (OSVDB)

    Id Description
    72583 SecureSphere New Alerts Page toolbarTitle XSS

    A persistent cross-site scripting vulnerability is present in the Imperva SecureSphere GUI. Usercontrollable input supplied to the Imperva event database via traffic destined for protected servers is not properly sanitized for illegal or malicious content prior to being stored and later returned to the user in dynamically generated web content. Remote attackers could leverage this issue to conduct persistent cross-site scripting attacks. When the malicious content is viewed in the administrative GUI, arbitrary script or HTML code injected into the affected field will be executed in an administrator's browser session in the security context of a vulnerable SecureSphere GUI session.