{"id":16577,"date":"2021-07-08T10:07:20","date_gmt":"2021-07-08T08:07:20","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/security-advisories\/usd-2018-0028\/"},"modified":"2021-07-19T14:09:25","modified_gmt":"2021-07-19T12:09:25","slug":"usd-2018-0028","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2018-0028\/","title":{"rendered":"usd-2018-0028"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<h1 class=\"h-custom-headline usd-small-letters h2\"><span>usd-2018-0028 | Icinga Web 2\/2.6.1<\/span><\/h1>\n<p><span><\/span><br \/><strong>Advisory ID<\/strong><span>: usd-2018-0028<\/span><br \/><strong>CVE number<\/strong><span>: CVE-2018-18248<\/span><br \/><strong>Affected Product<\/strong><span>: Icinga Web 2<\/span><br \/><strong>Affected Version<\/strong><span>: 2.6.1<\/span><br \/><strong>Vulnerability Type<\/strong><span>: Reflected XSS<\/span><br \/><strong>Security Risk<\/strong><span>: medium<\/span><br \/><strong>Vendor URL<\/strong><span>: <\/span><a href=\"https:\/\/www.icinga.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.icinga.com\/<\/a><br \/><strong>Vendor Status<\/strong><span>: Won\u2019t fix<\/span><\/p>\n<h3><\/h3>\n<h3>Description<\/h3>\n<p><span>Reflected XSS attack (or non-persistent attack) occur when a malicious script is reflected off of a web application to the victim\u2019s browser. The attack is typically delivered via email or a web site and activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.<\/span><\/p>\n<p><span><\/span><\/p>\n<h3>Proof of Concept (PoC)<\/h3>\n<p>Icinga Web 2 does not properly validate and encode parameters received through HTTP GET requests. When the following URLs are requested by an authenticated user the HTTP response will contain malicious JavaScript:<\/p>\n<p>\/icingaweb2\/monitoring\/list\/services?service_state=0&amp;limit=10&amp;sort=service_last_state_change&amp;dir=\u201c&gt;alert(1)&amp;view=compact<\/p>\n<p>\/icingaweb2\/user\/list?(user=\u201conmouseover=\u201calert(1)\u201c<\/p>\n<p>\/icingaweb2\/monitoring\/timeline?start=1536242399&amp;end=1536156000&amp;extend=1&amp;\u201c&gt;alert(1)=1<\/p>\n<p>The following URL requires the setup module to be enabled but does not require the victim to be authenticated:<\/p>\n<p>\/icingaweb2\/setup?\u201c&gt;alert(1)=1<\/p>\n<p>Note:<br \/>Since the payloads is introduced through the URL, some modern browsers will encode the special characters (\u00b4'\u201c etc.) or detect the XSS attempt and block the request. This should mitigate the effects of this vulnerability in most real-world cases.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"e16902-22 x-container max width\">\n<div class=\"e16902-23 x-column x-sm x-1-1\">\n<h3>Fix<\/h3>\n<p><span>Make sure to validate the user supplied input and encode the output.<\/span><br \/><span>https:\/\/www.owasp.org\/index.php\/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet<\/span><\/p>\n<h3><\/h3>\n<h3>Timeline<\/h3>\n<ul>\n<li>2018-09-12 First contact request via security@icinga.com<\/li>\n<li>2018-10-02 Vendor received advisories via security@icinga.com<\/li>\n<li>2018-10-11 CVE-ID requested<\/li>\n<li>2018-10-12 received CVE ID and notified vendor about it<\/li>\n<li>2018-11-08 vendor states that they won\u2019t fix the vulnerability as in their opinion it is already handled reasonable by browsers<\/li>\n<li>2018-11-09 extended public disclosure deadline to 2018-11-25<\/li>\n<li>2018-12-07 Security advisory released<\/li>\n<\/ul>\n<h3><\/h3>\n<h3>Credits<\/h3>\n<p><span>These security vulnerabilities were found by Maximilian Boehner of usd AG.<\/span><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\"]<\/p>\n<p>The <em>X-OWA-UrlPostData<\/em> header could be decoded to the following:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2018-0028 | Icinga Web 2\/2.6.1 Advisory ID: usd-2018-0028CVE number: CVE-2018-18248Affected Product: Icinga Web 2Affected Version: 2.6.1Vulnerability Type: Reflected XSSSecurity Risk: mediumVendor URL: https:\/\/www.icinga.com\/Vendor Status: Won\u2019t fix Description Reflected XSS attack (or non-persistent attack) occur when a malicious script is reflected off of a web application to the victim\u2019s browser. The attack is typically delivered via [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16577","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16577"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16577\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}