Flexense DiskPulse 10.7 Cross Site Scripting

Flexense DiskPulse versions 10.1 through 10.7 suffer from a cross site scripting vulnerability.

MD5 | e62946400eb17c92fe50a11afbb871b1

URL: localhost/
Affected Component: */?n0ipr0cs<script>alert('XSS')</script>n0ipr0cs=1*

*Vulnerability Type:*
Cross Site Scripting https://cwe.mitre.org/data/definitions/79.html

*Vendor of Product: *
Flexense DiskPulse

*Version: *
from v10.4 to v10.7.

*Attack Type: *

*Impact: *
This attack allows an attacker code execution. The vulnerability affects
the confidentiality of personal data, possible theft of confidential
information, for example credentials of session, cookie information,
personal information, or a possible loss of control of the PC.

DiskPulse is a real-time disk change monitoring solution allowing one to
monitor one or more disks or directories, save reports and disk change
monitoring statistics, export detected changes to a centralized SQL
database, execute custom commands and send E-Mail notifications when
unauthorized changes are detected in critical system files.

This vulnerability have been discovered by
Francisco Javier Santiago VA!zquez aka "n0ipr0cs"

*Disclosure Timeline:*
April 07, 2018: Vulnerability acquired by Francisco Javier Santiago
VA!zquez. aka "n0ipr0cs".
April 07, 2018: Responsible disclosure to Flexense Security Team.
April 18, 2018: Second Message Responsible disclosure to Flexense Security
April 26, 2018: The vulnerability has been fixed.The new product version
(v10.8) fixes a number of bugs and security vulnerabilities, this include
April 30, 2018: Disclosure of vulnerability.



F. Javier Santiago VA!zquez

Related Posts