[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Enterasys SecureStack Switch v6.x - Multiple Vulnerabilities



Title:
======
Enterasys SecureStack Switch v6.x - Multiple Vulnerabilities


Date:
=====
2012-03-08


References:
===========
http://www.vulnerability-lab.com/get_content.php?id=443


VL-ID:
=====
443


Introduction:
=============
The Enterasys C5 is a scalable, high-performance Gigabit Ethernet switch 
offering support for IEEE 802.3at 
compliant high-power PoE, flexible 10 Gigabit Ethernet options, dynamic IPv4 
and IPv6 routing and enhanced 
automation capabilities to provide for a future-proofed solution that 
significantly reduces operational 
expenses for customers. Along with a switch capacity of 264 Gbps, the C5 
provides up to 48 10/100/1000 
Ethernet ports as well as two SFP+ ports, with the ability to support both 1GE 
and 10GE uplinks on the same 
port. Leveraging the C5’s stacking capability, as many as 8 C5s (both 24-port 
and 48-port combinations) can 
be interconnected in a single stack to create a virtual switch that provides 
2.11 Tbps of capacity and up to 
384 10/100/1000 Ethernet ports as well as 16 10GE uplink ports. All C-Series 
products include a comprehensive 
lifetime warranty that includes services for which many competitors charge 
additional fees. Included benefits, 
such as advanced hardware return, firmware feature upgrades (which most vendors 
cover at most for 90 days) 
and telephone support (which most don’t include or severely limit) combine to 
significantly decrease operational costs 
for organizations – equaling savings of up to $1 million in service contract 
fees over the life of a customer’s network.

(Copy of the Vendor Homepage: 
http://www.enterasys.com/products/security-enabled-infrastructure/securestack-cseries.aspx
 )


Abstract:
=========
A Vulnerability Laboratory Researcher discovered multiple Web Vulnerabilities 
on Enterasys SecureStack Switch v6.x.


Report-Timeline:
================
2012-02-16:     Vendor Notification
2012-**-**:     Vendor Response/Feedback
2012-**-**:     Vendor Fix/Patch 
2012-03-08:     Public or Non-Public Disclosure


Status:
========
Published


Affected Products:
==================
Enterasys
Product: SecureStack Switch v6.x


Exploitation-Technique:
=======================
Remote


Severity:
=========
High


Details:
========
Multiple persistent Input Validation vulnerabilities are detected on Enterasys 
SecureStack Switches Series A - C. 
Local low privileged user accounts can implement/inject malicious script code 
to manipulate modules via persistent context 
requests. When exploited by an authenticated user, the identified 
vulnerabilities can result in information disclosure via error, 
session hijacking, access to available appliance services, manipulated 
persistent content execution out of the application context.

Vulnerable Module(s): 
                                        [+] System Name
                                        [+] System Location
                                        [+] System Contact
                                        [+] VLAN Name

Affected Model(s):
                                        [+] B2G124-24 - Firmware: 04.02.08.0006
                                        [+] B2G124-48 - Firmware: 04.02.08.0006
                                        [+] B3G124-48 - Firmware: 04.02.08.0006
                                        [+] B5G124-24 - Firmware: 06.41.02.0007
                                        [+] B5G124-48 - Firmware: 
06.41.05.0001, 06.41.06.0002, 06.42.08.0007
                                        [+] C3G124-24P - Firmware: 
06.03.08.0012, 06.42.10.0016 (latest)
                                        [+] C3G124-48 - Firmware: 06.03.04.0004
                                        [+] C3G124-48P - Firmware: 06.03.08.0012

Picture(s):
                                        ../1.png
                                        ../2.png
                                        ../3.png
                                        ../4.png
                                        ../5.png
                                        ../6.png


Proof of Concept:
=================
The vulnerabilities can be exploited by remote attackers with low required user 
inter action. For demonstration or reproduce ...

Exploitation via Console:
Command#1: set vlan name 1337 <script>alert(document.cookie)</script>
Command#2: set system name <iframe src=http://www.vulnerability-lab.com>
Command#3: set system location "><iframe src=a onload=alert("VL") <
Command#4: set system contact <script>alert('VL')</script>

Note: To exploit the bug via webinterface, see pictures section.


Risk:
=====
The security risk of the persistent Input Validation Vulnerabilities is 
estimated as high(-).


Credits:
========
Vulnerability Laboratory Researcher   -  Julien Ahrens  (MrTuxracer) 
[www.inshell.net]



Disclaimer:
===========
The information provided in this advisory is provided as it is without any 
warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and 
capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, 
indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have 
been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential 
or incidental damages so the foregoing limitation 
may not apply. Any modified copy or reproduction, including partially usages, 
of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified 
form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab or its suppliers.

                                                Copyright © 
2012|Vulnerability-Lab

-- 
Website: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com
Contact: admin@xxxxxxxxxxxxxxxxxxxxx or support@xxxxxxxxxxxxxxxxxxxxx