CVE-2014-7293 NYU OpenSSO Integration XSS (Cross-Site Scripting) Security Vulnerability

computer-key

 

CVE-2014-7293 NYU OpenSSO Integration XSS (Cross-Site Scripting) Security Vulnerability

 

Exploit Title: NYU OpenSSO Integration Logon Page url Parameter XSS

Product: OpenSSO Integration

Vendor: NYU

Vulnerable Versions: 2.1 and probability prior

Tested Version: 2.1

Advisory Publication: DEC 29, 2014

Latest Update: DEC 29, 2014

Vulnerability Type: Cross-Site Scripting [CWE-79]

CVE Reference: CVE-2014-7293

Risk Level: Medium

CVSS v2 Base Score: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)

Credit: Wang Jing [CCRG, Nanyang Technological University (NTU), Singapore]

Advisory Details:

(1) Vendor URL:

http://www.exlibrisgroup.org/display/CrossProductCC/PDS+OpenSSO+Integration

Product Description:

“NYU has integrated PDS with Sun’s OpenSSO Identity Management application. The PDS/OpenSSO integration uses PDS as the NYU Libraries’ single sign-on system and leverages NYU’s OpenSSO system to provide seamless interaction between library applications and university services. The integration merges patron information from OpenSSO (e.g. name, email, e-resources access) with patron information from Aleph (e.g. borrower status and type) to ensure access to the multitude of library services."

“The NYU Libraries operate in a consortial environment in which not all users are in OpenSSO and not all OpenSSO users are in Aleph. PDS is hosted in an active/passive capacity on our Primo front-end servers. Due to the nature of PDS and Aleph, patrons are required to have an Aleph account in order to login to the library’s SSO environment. The exception to this rule is EZProxy."

 

 

(2) Vulnerability Details:

NYU OpenSSO Integration has a security problem. It can be exploited by XSS Attacks.

 

(2.1) The vulnerability occurs at “PDS” service’s logon page, with “&url” parameter,

References:

http://tetraph.com/security/cves/cve-2014-7293-ex-libris-patron-directory-services-pds-xss-cross-site-scripting-security-vulnerability/

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7293

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7293

http://seclists.org/fulldisclosure/2014/Dec/125

http://www.securityfocus.com/bid/71812

http://en.hackdig.com/wap/?id=12211

http://iedb.ir/exploits-2481.html

http://static-173-79-223-25.washdc.fios.verizon.net/?a=139222176300014&r=1&w=2

http://tetraph.blog.163.com/blog/static/234603051201511084313351/

http://lists.kde.org/?a=139222176300014&r=1&w=2

http://mathswift.blogspot.com/2015/02/cve-2014-7293-nyu-opensso-integration.html

http://marc.info/?a=139222176300014&r=1&w=4

https://computertechhut.wordpress.com/2015/02/10/cve-2014-7293-nyu-opensso-integration-xss-cross-site-scripting-security-vulnerability/

http://www.intelligentexploit.com/view-details.html?id=20493

 

CVE-2014-7293 NYU OpenSSO Integration XSS (Cross-Site Scripting) Security Vulnerability | INZEED Business Information & Counsel 發表迴響 取消回覆

你的電子郵件位址並不會被公開。 必要欄位標記為 *

你可以使用這些 HTML 標籤與屬性: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>