(PT-2011-07) Positive Technologies Security Advisory
Cross-Site Scripting in Cisco Small Business Devices
Vulnerable products
Cisco SPA8000 8-port IP Telephony Gateway 6.1.10 and earlier
Cisco SPA8800 IP Telephony Gateway 6.1.7 and earlier
Cisco SPA2102 Phone Adapter with Router 5.2.12 and earlier
Cisco SPA3102 Voice Gateway with Router 5.1.10 and earlier
Cisco Small Business SPA500 Series IP Phones 7.4.8a and earlier
Link:
http://www.cisco.com/
Severity level
Severity level: Medium
Impact: Cross-Site Scripting
Access Vector: Remote
CVSS v2:
Base Score: 4.3
Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVE: CVE-2011-2545
Product description
Cisco Small Business IP Telephony devices are intended for high-volume deployments by VoIP service providers to residential and small business customers.
Vulnerability description
The specialists of the Positive Research center have detected "Cross-Site Scripting" vulnerability in Cisco Small Business Devices.
User input passed to "Display name" and "User ID" parameters of SIP INVITE request "FROM" field is not properly sanitized. This can be exploited to inject malicious code and allows to execute arbitrary HTML and script code in user/admin browser session in context of IP phone's web management console (Call Log).
Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool users in order to gather data from their machines. An attacker can steal the session cookie and take over the account impersonating the user. It is also possible to modify page content presented to the user.
How to fix
Cisco customers with active contracts can obtain updates through the Software Center at the following link: Cisco.
Cisco customers without contracts can obtain upgrades by contacting the Cisco Technical Assistance Center via e-mail at tac@cisco.com.
Advisory status
23.06.2011 - Vendor is notified
24.06.2011 - Vendor gets vulnerability details
12.06.2012 - Vendor releases fixed version and details
27.09.2012 - Public disclosure
Credits
The vulnerability has discovered by Alexander Zaitsev, Gleb Gritsai, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2011-07
http://tools.cisco.com/security/center/viewAlert.x?alertId=26037
Reports on the vulnerabilities previously discovered by Positive Research:
http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/
About Positive Technologies
Positive Technologies www.ptsecurity.com is among the key players in the IT security market in Russia.
The principal activities of the company include the development of integrated tools for information security monitoring (MaxPatrol); providing IT security consulting services and technical support; development of the Securitylab leading Russian information security portal.
Among the clients of Positive Technologies, there are more than 40 state enterprises, more than 50 banks and financial organizations, 20 telecommunication companies, more than 40 plant facilities, as well as IT, service and retail companies from Russia, the CIS countries, the Baltic States, China, Ecuador, Germany, Great Britain, Holland, Iran, Israel, Japan, Mexico, the Republic of South Africa, Thailand, Turkey, and the USA.
Positive Technologies is a team of highly skilled developers, advisers and experts with years of vast hands-on experience. The company specialists possess professional titles and certificates; they are the members of various international societies and are actively involved in the IT security field development.
Get in touch
will contact you shortly