SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Directory)  >   Novell eDirectory Vendors:   Novell
Novell/NetIQ eDirectory iMonitor Bugs Let Remote User Conduct Cross-Site Scripting Attacks and Remote Authenticated Users Remove Data and Obtain Potentially Sensitive Information
SecurityTracker Alert ID:  1031408
SecurityTracker URL:  http://securitytracker.com/id/1031408
CVE Reference:   CVE-2014-5212, CVE-2014-5213   (Links to External Site)
Date:  Dec 19 2014
Impact:   Denial of service via network, Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, Not specified, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 8.8 SP8 Patch 4
Description:   Several vulnerabilities were reported in Novell eDirectory. A remote user can conduct cross-site scripting attacks. A remote authenticated user can view potentially sensitive information. A remote authenticated administrative user can remove data files. The impact of one vulnerability was not disclosed.

The iMonitor administrative interface does not properly filter HTML code from user-supplied input before displaying the input [CVE-2014-5212]. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Novell eDirectory iMonitor software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A demonstration exploit URL is provided:

https://[target]:8030/nds/search/data?scope=st&rdn=%3C/script%20%3E%3Cscript%20
%3Ealert%28%22XSS%22%29%3C/script%20%3E

W. Ettlinger of SEC Consult Vulnerability Lab reported this vulnerability.

A remote authenticated user can supply a specially crafted request to view portions of virtual memory and obtain potentially sensitive information [CVE-2014-5213].

A demonstration exploit URL is provided:

https://[target]:8030/nds/files/opt/novell/eDirectory/lib64/ndsimon/public/images

W. Ettlinger of SEC Consult Vulnerability Lab reported this vulnerability.

A remote authenticated administrative user can exploit a flaw in iMonitor to remove eDirectory data files.

A user can trigger a buffer overflow in iMonitor. The impact was not disclosed.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Novell eDirectory iMonitor software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A remote authenticated user can view potentially sensitive information.

A remote authenticated administrative user can remove data files.

The impact of one vulnerability was not disclosed.

Solution:   The vendor has issued a fix (8.8 SP8 Patch 4).

The vendor's advisory is available at:

https://www.novell.com/support/kb/doc.php?id=3426981

Vendor URL:  www.novell.com/support/kb/doc.php?id=3426981 (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error
Underlying OS:  Linux (Red Hat Enterprise), Linux (SuSE), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (2000), Windows (2003)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC