SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Cisco Secure Access Control System Vendors:   Cisco
Cisco Secure ACS for UNIX Input Validation Flaw in 'LogonProxy.cgi' Permits Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1016317
SecurityTracker URL:  http://securitytracker.com/id/1016317
CVE Reference:   CVE-2006-3101   (Links to External Site)
Updated:  Oct 13 2008
Original Entry Date:  Jun 16 2006
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco Secure Access Control Server for UNIX. A remote user can conduct cross-site scripting attacks.

The 'LogonProxy.cgi' script does not properly filter HTML code from user-supplied input in both HTTP GET and HTTP POST requests before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Cisco Secure ACS for UNIX software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Some demonstration exploit URLs are provided:

http://[target]/CScgi/LogonProxy.cgi?Server=0.0.0.0&error=<script>alert("help")</script>

http://[target]/CScgi/LogonProxy.cgi?Server=10.17.12.184/Logon?null&SSL=<script>alert('help')</script>

http://[target]/CScgi/LogonProxy.cgi?Ok=<script>alert('help')</script>

Cisco credits Thomas Liam Romanis and Fujitsu Services with reporting this vulnerability.

Only Cisco Secure ACS for UNIX is affected.

Cisco Secure ACS for Windows and Cisco Secure ACS Solution Engine are not affected.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Cisco Secure ACS for UNIX software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   The vendor has issued a fix (patch for CSCsd50560), available at:

http://www.cisco.com/pcgi-bin/tablebuild.pl/cspatchunix-3des

The Cisco security response is available at:

http://www.cisco.com/warp/public/707/cisco-sr-20060615-acs.shtml

Vendor URL:  www.cisco.com/warp/public/707/cisco-sr-20060615-acs.shtml (Links to External Site)
Cause:   Input validation error
Underlying OS:  UNIX (Any)

Message History:   None.


 Source Message Contents

Subject:  Cisco Security Response: Cisco Secure ACS for UNIX Cross Site Scripting Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Response: Cisco Secure ACS for UNIX Cross Site
Scripting Vulnerability

Document ID: 70471

http://www.cisco.com/warp/public/707/cisco-sr-20060615-acs.shtml

Revision 1.0

For Public Release 2006 June 15 1700 UTC (GMT)

- ---------------------------------------------------------------------

Contents
========

    Cisco Response
    Additional Information
    Revision History
    Cisco Security Procedures

- ---------------------------------------------------------------------

Cisco Response
==============

This is Cisco PSIRT response to the statements made by Fujitsu
Services Limited in their advisory, posted on June 15, 2006 to
several external mailing lists.

This vulnerability is addressed by Cisco Bug ID:

  * CSCsd50560 ACS LogonProxy.cgi vulnerable to Cross Site 
               Scripting attacks.

We would like to thank Thomas Liam Romanis and Fujitsu Services
Limited for reporting this vulnerability to us.

We greatly appreciate the opportunity to work with researchers on
security vulnerabilities, and welcome the opportunity to review and
assist in product reports.

Additional Information
======================

Cisco Secure Access Control Server (ACS) is a centralized user access
control framework. Cisco Secure ACS offers centralized command and
control for all user authentication, authorization, and accounting
(AAA pronounced "triple A") services to network devices that function
as AAA clients.

Cisco Secure ACS for UNIX LogonProxy.cgi is vulnerable to Cross Site
Scripting (XSS) attacks via both HTML GET and POST requests.

This vulnerability affects only Cisco Secure ACS for Unix.

Cisco Secure ACS for Windows and Cisco Secure ACS Solution Engine are
not affected.

This vulnerability could be used to redirect the ACS administrative
users to another host which could be used to proxy login requests
back to the bona fide ACS server while harvesting administrative user
credentials.

Solution
+-------

Download and apply patch for CSCsd50560, which is located on
Cisco.com at: 

http://www.cisco.com/pcgi-bin/tablebuild.pl/cspatchunix-3des.

Instructions for applying the patch are found at the same location.

The following best practices will help mitigate the risks of this
vulnerability:

  * Ensure that only IP addresses of trusted administrator hosts can
    access the Cisco Secure ACS server.
  * Prevent access to the web component of the ACS server over the
    Internet.

THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.

Revision History
================

+---------------------------------------+
| Revision |              | Initial     |
| 1.0      | 2006-June-15 | public      |
|          |              | release.    |
+---------------------------------------+

Cisco Security Procedures
=========================

Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and
registering to receive security information from Cisco, is available
on Cisco's worldwide website at 
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html. 
This includes instructions for press inquiries regarding Cisco 
security notices. All Cisco security advisories are available at 
http://www.cisco.com/go/psirt.

- ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD4DBQFEkZPa8NUAbBmDaxQRAlXLAJ4oOPCNGra4iNIcLV3Aygvl8PsfcQCY4b2N
ObiKRQNBm6aSiTpdhKkIhw==
=U6+C
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC