Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:18239
HistoryOct 20, 2007 - 12:00 a.m.

S21SEC-038-en: Alcatel Omnivista 4760 Cross-Site Scripting

2007-10-2000:00:00
vulners.com
42

##############################################################
- S21Sec Advisory -
##############################################################

     Title:   Alcatel Omnivista 4760 Cross-Site Scripting
        ID:   S21SEC-038-en

Severity: Medium -
History: 10.Jun.2007 Vulnerability discovered
20.Jun.2007 Vendor contacted
19.Oct.2007 Advisory released
Authors: Juan de la Fuente Costa ([email protected])
Pablo Seijo Cajaraville ([email protected])
URL: http://www.s21sec.com/avisos/s21sec-038-en.txt
Release: Public

[ SUMMARY ]

Alcatel-Lucent OmniVista 4760 is an innovative, modular platform that
provides a suite of network management applications.
This powerful Java-based tool, accessed through a Web browser,
provides centralized management for the OmniPCX Enterprise.

The platform's open architecture enables today's IT managers and
administrators to effectively monitor and maintain the
network, while lowering the company's total cost of ownership. This
suite of network management applications includes:

 * LDAP Directory
 * Configuration
 * Accounting/Performance Management
 * Alarm Notification
 * Network Topology

[ AFFECTED VERSIONS ]

This vulnerability has been tested in Alcatel Omnivista 4760.

[ DESCRIPTION ]

S21sec has discovered a vulnerability in Alcatel Omnivista 4760 that
allows injecting JavaScript code in text variables.
This issue allows javascript code execution in the user browser.

The identified parameters are: "action" and "Langue"

Parameter: action

URL: http://www.somesite.com/php-bin/Webclient.php?
action=<script>alert("xss")</script>

Parameter: Langue

URL: http://www.somesite.com/?Langue=&quot;&gt;&lt;script&gt;alert&#40;&quot;xss&quot;&#41;&lt;/script&gt;&lt;&quot;;

[ WORKAROUND ]

Alcatel-Lucent has released a patch to address this vulnerability.
More info at:
http://www1.alcatel-lucent.com/psirt/statements/2007003/4760xss.htm

[ ACKNOWLEDGMENTS ]

This vulnerability has been discovered and researched by:

With special thanks to:

  • Miguel Angel Aguilar Bermejo

[ REFERENCES ]