Hipergate 4.0.12 - Multiple Vulnerabilities

EDB-ID:

11324

CVE:





Platform:

JSP

Date:

2010-02-03


Permanent XSS:

Advisory Name: Permanent Cross-Site Scripting (XSS) in Hipergate 4.0.12

Vulnerability Class: Permanent Cross-Site Scripting (XSS)

Release Date: 2010-02-02

Affected Applications: Confirmed in Hipergate 4.0.12. Other versions may also be affected

Affected Platforms: Multiple

Local / Remote: Remote

Severity: Medium – CVSS: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Researcher: Nahuel Grisolía

Vendor Status: Still Vulnerable – No Patch Available at the moment

Vulnerability Description:
A permanent Cross Site Scripting vulnerability was found in Hipergate 4.0.12, because the application
fails to sanitize user-supplied input. Any logged-in user who is able to add a New Campaign can trigger
the vulnerability.

Proof of Concept:
* Add <script>alert(“XSS in Campaign”);</script> as a new campaign.

Impact:

An affected user may unintentionally execute scripts or actions written by an attacker. In addition, an
attacker may obtain authorization cookies that would allow him to gain unauthorized access to the
application.
Solution: Maybe in Build 5.5 (Future Release, information provided by the vendor)
Vendor Response: Last Contact on January 12, 2010. They said that no more patches would be
provided since Build 5.5 will be released soon.
Contact Information:
For more information regarding the vulnerability feel free to contact the researcher at
nahuel.grisolia <at> gmail <dot> com

Reflected XSS:

Advisory Name: Reflected Cross-Site Scripting (XSS) in Hipergate

Vulnerability Class: Reflected Cross-Site Scripting (XSS)

Release Date: 2010-02-02

Affected Applications: Confirmed in Hipergate 4.0.12. Other versions may also be affected

Affected Platforms: Multiple

Local / Remote: Remote

Severity: Medium – CVSS: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Researcher: Nahuel Grisolía

Vendor Status: Still Vulnerable – No Patch Available at the moment

Vulnerability Description:

A reflected Cross Site Scripting vulnerability was found in Hipergate 4.0.12, because the application
fails to sanitize user-supplied input. Any logged-in user can trigger the vulnerability.

Proof of Concept:

http://x.x.x.x:8080/hipergate/common/errmsg.jsp?title=%3Cscript%3Ealert%28%22titleXSS%22%29;
%3C/script%3E&desc=%3Cscript%3Ealert%28%22descXSS%22%29;%3C/script%3E&resume=_bac
k
Script pwd_errmsg.jsp is also affected.

Impact:

An affected user may unintentionally execute scripts or actions written by an attacker. In addition, an
attacker may obtain authorization cookies that would allow him to gain unauthorized access to the
application.
Solution: Maybe in Build 5.5 (Future Release, information provided by the vendor)
Vendor Response: Last Contact on January 12, 2010. They said that no more patches would be
provided since Build 5.5 will be released soon.
Contact Information:
For more information regarding the vulnerability feel free to contact the researcher at
nahuel.grisolia <at> gmail <dot> com

SQL Command Exec:

Advisory Name: SQL Command Exec in Hipergate

Vulnerability Class: SQL Command Exec

Release Date: 2010-02-02

Affected Applications: Confirmed in Hipergate 4.0.12. Other versions may also be affected.

Affected Platforms: Multiple

Local / Remote: Remote

Severity: High – CVSS: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Researcher: Nahuel Grisolía

Vendor Status: Still Vulnerable – No Patch Available at the moment

Vulnerability Description:
A vulnerability has been discovered in Hipergate, which can be exploited by malicious people to
conduct SQL Command Execution Attacks.
The vulnerability is confirmed in version 4.0.12. Other versions may also be affected.

Proof of Concept:

http://x.x.x.x:8080/hipergate/admin/sql.htm

Impact: Execute arbitrary SQL queries.

Solution: Maybe in Build 5.5 (Future Release, information provided by the vendor)

Vendor Response: Last Contact on January 12, 2010. They said that no more patches would be
provided since Build 5.5 will be released soon.

Contact Information:

For more information regarding the vulnerability feel free to contact the researcher at
nahuel.grisolia <at> gmail <dot> com