Web Inspection Security Vulnerabilities
Posted: Fri Jan 11, 2019 12:38 pm
Our security team has identified a few vulnerabilities that we need some help on.
The two critical issues are Cross-Site Scripting Reflected issued with Nagvis with an invalid session. "It only happens when you have an invalid session - that is, one with an invalid character, too short, too long, etc. Not an expired one.".
GET /nagvis/frontend/nagvis-js/index.php?mod=Map&act=view&show=demo-overview<sCrIpT>alert(85263)</sCrIpT>&lang=en_US HTTP/1.1
Accept: */*
And an issue with the persistent cookie. Is it possible to set the cookie to a session cookie?
Set-Cookie: nagiosxi=m740i6c19mduif1qid373sne85; expires=Mon, 07-Jan-2019 18:25:19 GMT; path=/; secure; httponly;HttpOnly;Secure
HTTP Verb Tampering - they don't like the server responding the the HEAD request. Can the Apache web server be modified to restrict the HTTP Verbs to GET, POST, PUT and DELETE.
The two critical issues are Cross-Site Scripting Reflected issued with Nagvis with an invalid session. "It only happens when you have an invalid session - that is, one with an invalid character, too short, too long, etc. Not an expired one.".
GET /nagvis/frontend/nagvis-js/index.php?mod=Map&act=view&show=demo-overview<sCrIpT>alert(85263)</sCrIpT>&lang=en_US HTTP/1.1
Accept: */*
And an issue with the persistent cookie. Is it possible to set the cookie to a session cookie?
Set-Cookie: nagiosxi=m740i6c19mduif1qid373sne85; expires=Mon, 07-Jan-2019 18:25:19 GMT; path=/; secure; httponly;HttpOnly;Secure
HTTP Verb Tampering - they don't like the server responding the the HEAD request. Can the Apache web server be modified to restrict the HTTP Verbs to GET, POST, PUT and DELETE.