Title: ====== Endpoint Protector v4.0.4.0 - Multiple Web Vulnerabilities Date: ===== 2012-10-01 References: =========== http://www.vulnerability-lab.com/get_content.php?id=571 VL-ID: ===== 571 Common Vulnerability Scoring System: ==================================== 5 Introduction: ============= Endpoint Protector 4 protect your network from the threats posed by portable storage devices. Portable devices such as USB flash drives and smartphones may cause severe issues when it comes to controlling data use within and outside the company. As a full DLP product, Endpoint Protector 4 prevents users from taking unauthorized data outside the company or bringing potential harmful files on USB devices, files which can have a significant impact on your network’s health. (Copy of the Vendor Homepage: http://www.endpointprotector.com/products/endpoint_protector ) Abstract: ========= The Vulnerability Laboratory Research Team discovered multiple Web Vulnerabilities in the Endpoint Protector v4.0.4.0 Appliance. Report-Timeline: ================ 2012-05-13: Researcher Notification & Coordination 2012-05-15: Vendor Notification 2012-05-20: Vendor Response/Feedback 2012-**-**: Vendor Fix/Patch 2012-10-01: Public or Non-Public Disclosure Status: ======== Published Affected Products: ================== Endpoint Product: Protector v4.0.4.0 Exploitation-Technique: ======================= Remote Severity: ========= High Details: ======== Multiple persistent input validation vulnerabilities are detected in Endpoint Protector v4.0.4.0 Appliance Application. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. The bug is located on the listing of the username & description result pages. The bug affect all result listings inside of the application and all username and description input fields. Another issues is located in the Domain Controller Name of the Directory Service & in the name, host + description of the department or snapshot configuration. Vulnerable Module(s): [+] Directory Service > Active Directory Import, Active Directory Deployment & AD Sync > Domain Controller Server Name [+] EndPoint Management > Users, Groups, Computers & Devices > Username, First Name, Last Name, Department, Phone & E-mail [+] System Maintance > System Snapshots > List Available Snapshots > Name & Description [+] System Configuration > System Departments > Edit Department > Name & Description Proof of Concept: ================= The persistent vulnerabilities can be exploited by remote attacker with low privileged user account or via medium or high required user inter action. For demonstration or reproduce ... Review: Groups Management Listing