[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[FD] SEC Consult SA-20241211-0 :: Reflected Cross-Site Scripting in Numerix License Server Administration System Login



SEC Consult Vulnerability Lab Security Advisory < 20241211-0 >
=======================================================================
              title: Reflected Cross-Site Scripting
            product: Numerix License Server Administration System Login
 vulnerable version: 1.1_596
      fixed version: -
         CVE number: CVE-2024-50585
             impact: medium
           homepage: https://connect.numerix.com/nlslogin.jsp
              found: 2024-04-05
                 by: Daniel Hirschberger (Office Bochum)
                     SEC Consult Vulnerability Lab

                     An integrated part of SEC Consult, an Eviden business
                     Europe | Asia

                     https://www.sec-consult.com

=======================================================================

Vendor description:
-------------------
"Founded in 1996, Numerix has over 19 offices, 700 clients and 90 partners
across more than 26 countries. Numerix is recognized across the industry for
its many breakthroughs in quantitative research and is proud of its
reputation for being able to price and risk manage any derivative instrument
– vanillas to the most sophisticated exotic products."

Source: https://www.numerix.com/about-numerix


Business recommendation:
------------------------
The vendor was unresponsive during multiple attempts to contact them via
various channels, hence there is no solution available. In case you are
using this software, be sure to restrict access and monitor logs.
Try to reach out to your contact person for this vendor and request a patch.

SEC Consult highly recommends to perform a thorough security review of the
product conducted by security professionals to identify and resolve potential
further security issues.


Vulnerability overview/description:
-----------------------------------
1) Reflected Cross-Site Scripting (CVE-2024-50585)
Users who click on a malicious link or visit a website under the control of an
attacker can be infected with arbitrary JavaScript which is running in the
context of the "Numerix License Server Administration System Login".
(FQDN: https://connect.numerix.com)


Proof of concept:
-----------------
1) Reflected Cross-Site Scripting (CVE-2024-50585)
This vulnerability can be triggered by sending the following POST request:
[ redacted ]

The server responds with the injected JavaScript code which is then
executed in the browser of the victim.

<xss.png>


Vulnerable / tested versions:
-----------------------------
This vulnerability was identified on 5th April 2024. The following version 
seems to be
affected:
* 1.1_596, powered by Orion v2.5.10-083015, Agilis Software


Vendor contact timeline:
------------------------
2024-04-08: Contacting vendor through support@xxxxxxxxxxx; no response
2024-04-24: Contacting vendor through support@xxxxxxxxxxx; no response
2024-05-06: Contacting vendor through sales@xxxxxxxxxxx; no response
2024-05-28: Found out that the page might be part of a solution which
            is developed by agilis-sw.com; contacted them via
            info@xxxxxxxxxxxxx; no response
2024-07-18: Contacted again via info@xxxxxxxxxxxxx; no response
2024-10-22: Contacting support@xxxxxxxxxxx, sales@xxxxxxxxxxx and
            license@xxxxxxxxxxx again, asking for a security contact.
            Contacting CEO of Agilis Software via LinkedIn connection
            request.
            No response from all channels.
2024-10-28: Asking CERT/CC for coordination support
2024-11-18: CERT/CC will not handle this case, recommending to go through
            with public disclosure
2024-12-11: Public disclosure of advisory.


Solution:
---------
The vendor was unresponsive during multiple attempts to contact them via
various channels, hence there is no solution available. In case you are
using this software, be sure to restrict access and monitor logs.
Try to reach out to your contact person for this vendor and request a patch.


Workaround:
-----------
None


Advisory URL:
-------------
https://r.sec-consult.com/numerix


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SEC Consult Vulnerability Lab
An integrated part of SEC Consult, an Eviden business
Europe | Asia

About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an
Eviden business. It ensures the continued knowledge gain of SEC Consult in the
field of network and application security to stay ahead of the attacker. The
SEC Consult Vulnerability Lab supports high-quality penetration testing and
the evaluation of new offensive and defensive technologies for our customers.
Hence our customers obtain the most current information about vulnerabilities
and valid recommendation about the risk profile of new technologies.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://sec-consult.com/career/

Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://sec-consult.com/contact/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Mail: security-research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: https://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult

EOF Daniel Hirschberger / @2024

Attachment: xss.png
Description: PNG image

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/