Security
Headlines
HeadlinesLatestCVEs

Headline

SEH utnserver Pro 20.1.22 Cross Site Scripting

SEH utnservyer Pro version 20.1.22 suffers from multiple persistent cross site scripting vulnerabilities.

Packet Storm
#xss#vulnerability#web#java
St. Pölten UAS 20241118-0-------------------------------------------------------------------------------                title| Multiple Stored Cross-Site Scripting              product| SEH utnserver Pro   vulnerable version| 20.1.22        fixed version| 20.1.35           CVE number| CVE-2024-11304               impact| High             homepage| https://www.seh-technology.com/                found| 2024-05-24                   by| P. Riedl, J. Springer, P. Chistè, D. Sagl, S. Vogt                     | These vulnerabilities were discovery during research at                     | St.Pölten UAS, supported and coordinated by CyberDanube.                     |                     | https://fhstp.ac.at | https://cyberdanube.com-------------------------------------------------------------------------------Vendor description-------------------------------------------------------------------------------"We are SEH from Bielefeld - manufacturer of high-quality network solutions.With over 35 years of experience in the fields of printing and networks, weoffer our customers a broad and high-level expertise in solutions for all typesof business environments."Source: https://www.seh-technology.com/us/company/about-us.htmlVulnerable versions-------------------------------------------------------------------------------utnserver Pro / 20.1.22utnserver ProMAX / 20.1.22INU-100 / 20.1.22Vulnerability overview-------------------------------------------------------------------------------1) Multiple Stored Cross-Site Scripting (CVE-2024-11304)Different settings on the web interface of the device can be abused to storeJavaScript code and execute it in the context of a user's browser.Proof of Concept-------------------------------------------------------------------------------1) Multiple Stored Cross-Site Scripting (CVE-2024-11304)The following snippet can be used to demonstrate, that stored cross-sitescripting is possible in multiple locations on the device:"><script>alert(document.location)</script>Examples are: * Users password: "usrMg_pwd"   This can be displayed in cleartext and executed in the device configuration. * Certificate options: "Common name", "Organization name", "Locality name"   This can be executed in the certificate information. * Device description: "Host name", "Contact person", "Description"   This can be executed in "Device -> Description". * USB password via uploading a crafted "_parameters.txt" file: "usbMdg_pwd"   This can be executed in the "Maintenance -> Content View" tab.Saving this text to the device description leads to a persistent cross-sitescripting. Therefore, everyone who openes the device description executes theinjected code in the context of the own browser.The vulnerabilities were manually verified on an emulated device by using theMEDUSA scalable firmware runtime (https://medusa.cyberdanube.com).Solution-------------------------------------------------------------------------------Install firmware version 20.1.35 to fix the vulnerabilities.Workaround-------------------------------------------------------------------------------NoneRecommendation-------------------------------------------------------------------------------CyberDanube recommends SEH Computertechnik customers to upgrade the firmware tothe latest version available.Contact Timeline-------------------------------------------------------------------------------2024-09-23: Contacting SEH Computertechnik and sent advisory to support.            Support answered, that vulnerabilities are fixed in version            20.1.35.2024-10-21: Closed the issue and scheduled publication for November.2024-11-18: Coordinated disclosure of advisory.Web: https://www.fhstp.ac.at/Twitter: https://x.com/fh_stpoeltenMail: [email protected] T. Weber / @2024

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution