[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    Re: [DSECRG-09-009] APC PowerChute Network Shutdown's Web Interface - XSS vulnerability
From:       Ansgar Wiechers <bugtraq () planetcobalt ! net>
Date:       2009-02-26 21:15:50
Message-ID: 20090226211550.GA29752 () mail ! planetcobalt ! net
[Download RAW message or body]

On 2009-02-26 Vladimir '3APA3A' Dubrovin wrote:
> --Thursday, February 26, 2009, 7:40:50 PM, you wrote to bugtraq@securityfocus.com:
> DSRG> Application:       APC PowerChute Network Shutdown's Web Interface
> DSRG> Vendor URL:        http://www.apc.com/
> DSRG> Bug:               XSS/Response Splitting
> 
> DSRG> Solution:          Use Firewall
> 
> Just wonder: how can firewall to protect against XSS/response splitting?

You don't give the bad guys access to your UPS's web interface?

Regards
Ansgar Wiechers
-- 
"The Mac OS X kernel should never panic because, when it does, it
seriously inconveniences the user."
--http://developer.apple.com/technotes/tn2004/tn2118.html
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic