{"id":319,"date":"2011-06-02T06:28:05","date_gmt":"2011-06-02T12:28:05","guid":{"rendered":"http:\/\/www.foofus.net\/?p=319"},"modified":"2011-06-02T06:28:05","modified_gmt":"2011-06-02T12:28:05","slug":"multi-tech-systems-multimodem-isms-multiple-xss-vulnerabilities","status":"publish","type":"post","link":"http:\/\/h.foofus.net\/?p=319","title":{"rendered":"Multi-Tech Systems &#8220;MultiModem iSMS&#8221; Multiple XSS Vulnerabilities"},"content":{"rendered":"<p style=\"text-align: left;\">Multi-Tech Systems &#8220;MultiModem iSMS&#8221; appliance is affected by multiple XSS (cross-site scripting) vulnerabilities, which potientally leads to the comprimise of the device.<\/p>\n<p>For the latest advisory <a href=\"http:\/\/www.foofus.net\/?page_id=349\">Click Here<\/a><\/p>\n<p>Attack #2 is more interesting because it can be remotely exploited via a SMS message.<\/p>\n<p>When reporting this issue it did come into question the 160 character limitation of SMS technology and if this would to limit the attacker. \u00a0In the proof of concept video, you can see exploitation was successful with 158 characters using the <a href=\"http:\/\/www.bindshell.net\/tools\/beef.html\">Browser Exploitation Framework BeEF<\/a>!<\/p>\n<p><object width=\"425\" height=\"344\"><param name=\"movie\" value=\"http:\/\/www.youtube.com\/v\/47qahAMtFeE?version=3&amp;hl=en_US\" \/><param name=\"allowFullScreen\" value=\"true\" \/><param name=\"allowscriptaccess\" value=\"always\" \/><embed type=\"application\/x-shockwave-flash\" width=\"425\" height=\"344\" src=\"http:\/\/www.youtube.com\/v\/47qahAMtFeE?version=3&amp;hl=en_US\" allowscriptaccess=\"always\" allowfullscreen=\"true\"><\/embed><\/object><\/p>\n<p>please visit <a href=\"http:\/\/www.securitypentest.com\">www.securitypentest.com<\/a> for the original advisory.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Multi-Tech Systems &#8220;MultiModem iSMS&#8221; appliance is affected by multiple XSS (cross-site scripting) vulnerabilities, which potientally leads to the comprimise of the device. For the latest advisory Click Here Attack #2 is more interesting because it can be remotely exploited via a SMS message. When reporting this issue it did come into question the 160 character [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-319","post","type-post","status-publish","format-standard","hentry","category-advisories"],"_links":{"self":[{"href":"http:\/\/h.foofus.net\/index.php?rest_route=\/wp\/v2\/posts\/319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/h.foofus.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/h.foofus.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/h.foofus.net\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"http:\/\/h.foofus.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=319"}],"version-history":[{"count":0,"href":"http:\/\/h.foofus.net\/index.php?rest_route=\/wp\/v2\/posts\/319\/revisions"}],"wp:attachment":[{"href":"http:\/\/h.foofus.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/h.foofus.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=319"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/h.foofus.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}