search menu icon-carat-right cmu-wordmark

CERT Coordination Center

pd-admin contains cross-site scripting vulnerabilities

Vulnerability Note VU#311644

Original Release Date: 2013-04-15 | Last Revised: 2013-04-15

Overview

pd-admin, a web interface for users of hosting providers, is susceptible to cross-site scripting (XSS) vulnerabilities.

Description

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

pd-admin, contains cross-site scripting (XSS) vulnerabilities.

The vulnerability report provided by Thomas Roth states:

Reflective cross-site scripting
When pasting the string below into the 'Create new directory' textfield (found under 'WebFTP' -> 'Overview'), the error page will include the attacker supplied JavaScript code.

"><script>alert("XSS");</script>

Stored cross-site scripting
When storing the string below as the body for an e-mail autoresponder, every time someone tries to change the text of the autoresponder, the attacker supplied JavaScript code will execute. By tricking a (higher privileged) support contact into looking at it, the attacker might be able to steal the support contact's session cookie.

</textarea><script>alert("XSS");</script>

Impact

An attacker may be able to exploit the cross-site scripting vulnerability to result in information leakage, privilege escalation, and/or denial of service on the host computer.

Solution

Apply an Update

pd-admin 4.17 has been released to address these vulnerabilities.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the web interface using stolen credentials from a blocked network location.

Vendor Information

311644
 

pd-admin Affected

Notified:  March 20, 2013 Updated: April 15, 2013

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N
Temporal 3.9 E:ND/RL:U/RC:UC
Environmental 2.9 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Thomas Roth for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

CVE IDs: CVE-2013-0129
Date Public: 2013-03-08
Date First Published: 2013-04-15
Date Last Updated: 2013-04-15 20:11 UTC
Document Revision: 18

Sponsored by CISA.