AOH :: HP Unsorted P :: TB13447.HTM

Persistent XSS on Aruba 800 Mobility Controller's login page



PR07-26: Persistent XSS on Aruba 800 Mobility Controller's login page
PR07-26: Persistent XSS on Aruba 800 Mobility Controller's login page



Date Found: 17th July 2007

Vendor informed: 23rd July 2007

Confirmed by vendor: 13th September 2007

Description:

Aruba 800 is vulnerable to a persistent XSS on the administrator login screen.

An unauthenticated user can re-write the hidden parameter 'url' by requesting a link under the /screens/ directory:

https://internalip:4343/screens/%22/%3E%3Cscript%3Ealert(1)%3C/script%3E

The payload stays intact until another user makes a request under the /screens/ directory, prior to logging in.

Consequences:

An attacker may be able to cause execution of malicious scripting code in the browser of an admin user. Such code would run within the security context of the target domain.

This type of attack can result in a persistent defacement of the target site, or the redirection of confidential information (i.e.: admin session IDs, passwords) to unauthorised third parties.

Since this XSS is of persistent nature, the admin user wouldn't have to be tricked to visit a specially-crafted URL, but rather simply visit the Aruba 800 login page at some point.

Severity: High

Author: Jan Fry [jan.fry [at] procheckup.com] of ProCheckUp Ltd (www.procheckup.com)

References:

http://www.arubanetworks.com/products/mobility-controllers/aruba-800.php

http://arubanetworks.com/support/alerts/aid-070907b.asc

Note: the vulnerability was originally documented by Aruba Networks but no information was provided regarding the exploitation of this XSS vulnerability in a persistent way. Aruba Networks has now updated their 'AID-070907b' advisory to include additional information.

ProCheckUp thanks Aruba Networks for working with us.

Solution: update the firmware to version 2.5.4.25.

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.