[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-disclosure] Forescout NAC multiple vulnerabilities
From:       "Joseph Sheridan" <joe () reactionis ! com>
Date:       2012-11-26 16:27:05
Message-ID: 08d101cdcbf2$e02ca9c0$a085fd40$ () reactionis ! com
[Download RAW message or body]

This is a multipart message in MIME format.

[Attachment #2 (multipart/related)]
This is a multipart message in MIME format.

[Attachment #4 (multipart/alternative)]


Forescout NAC (Network Access Control) multiple vulnerabilities:

 

 

 

Forescout NAC 6.3.4.1 Cross-Site Redirection Vulnerability (CVE-2012-4982)

 

The Forescout NAC device is vulnerable to cross-site redirection and could
be used to redirect a targetted victim to a malicious site. The 'a'
parameter is vulnerable on the 'login' page. See below for details: 

 

http://(NACIP)/assets/login?a=http://www.evil.com

 

Forescout NAC 6.3.4.1 Cross-Site Scripting Vulnerability (CVE-2012-4983)

 

The Forescout NAC device is vulnerable to two cross-site scripting issues
and could be used to redirect a targetted victim to a malicious site or gain
access to the NAC admin console. The 'a' parameter is vulnerable on the
'login' page and the search page 'rangesearch' is vulnerable to
authenticated users. See below for details: 

 

Login page:

http://(NACIP)/assets/login?a=asdf" onload="alert(123)">

 

Search field (needs authenticated user):

http://(NACIP)/assets/rangesearch?fromIndex=0&query=asdf"
onclick="alert(123)"&main_selection=all

 

 

Forescout NAC ICMP and ARP Protocols Not Filtered Vulnerability Advisory
(CVE-2012-4985)

 

Forescout NAC (Network Access Control) device is vulnerable to ICMP and ARP
protocol filter bypass. The NAC does not filter traffic from unknown clients
over these protocols. An attacker with an unauthorised device can engage ARP
poisoning attacks and potentially gain access to cleartext login credentials
traversing the network (where cleartext protocols are employed). The
attacker could then use these credentials via an authorised
terminal/workstation to gain full access to the network.

 

http://www.reactionpenetrationtesting.co.uk/forescout-cross-site-redirection
.html

http://www.reactionpenetrationtesting.co.uk/forescout-nac-xss.html

http://www.reactionpenetrationtesting.co.uk/forescout-nac-icmp-arp.html 

 

 

 

 

Best regards,

 

Joe

 

Joseph Sheridan

Director

CHECK Team Leader, CREST Infrastructure, CREST Application, CISSP

Tel: 07812052515

Web:  <http://www.reactionis.co.uk> www.reactionis.co.uk 

Email: joe@reactionis.co.uk

Reaction-White-small

Reaction Information Security Limited.

Registered in England No: 6929383

Registered Office: 1, The Mews, 69 New Dover Road, Canterbury, CT1 3DZ

 

This email and any files transmitted with it are confidential and are
intended solely for the use of the individual to whom they are addressed. If
you are not the intended recipient please notify the sender. Any
unauthorised dissemination or copying of this email or its attachments and
any use or disclosure of any information contained in them, is strictly
prohibited.

 

P Please consider the environment before printing this email

 


[Attachment #7 (text/html)]

<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" \
xmlns:w="urn:schemas-microsoft-com:office:word" \
xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" \
xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; \
charset=us-ascii"><meta name=Generator content="Microsoft Word 14 (filtered medium)"><!--[if \
!mso]><style>v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Webdings;
	panose-1:5 3 1 2 1 5 9 6 7 3;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	mso-fareast-language:EN-US;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-GB link=blue vlink=purple><div \
class=WordSection1><p class=MsoNormal>Forescout NAC (Network Access Control) multiple \
vulnerabilities:<o:p></o:p></p><p class=MsoNormal><o:p>&nbsp;</o:p></p><p \
class=MsoNormal><o:p>&nbsp;</o:p></p><p class=MsoNormal><o:p>&nbsp;</o:p></p><p \
class=MsoNormal>Forescout NAC 6.3.4.1 Cross-Site Redirection Vulnerability \
(CVE-2012-4982)<o:p></o:p></p><p class=MsoNormal><o:p>&nbsp;</o:p></p><p class=MsoNormal>The \
Forescout NAC device is vulnerable to cross-site redirection and could be used to redirect a \
targetted victim to a malicious site. The 'a' parameter is vulnerable on the 'login' page. See \
below for details: <o:p></o:p></p><p class=MsoNormal><o:p>&nbsp;</o:p></p><p \
class=MsoNormal>http://(NACIP)/assets/login?a=http://www.evil.com<o:p></o:p></p><p \
class=MsoNormal><o:p>&nbsp;</o:p></p><p class=MsoNormal>Forescout NAC 6.3.4.1 Cross-Site \
Scripting Vulnerability (CVE-2012-4983)<o:p></o:p></p><p \
class=MsoNormal><o:p>&nbsp;</o:p></p><p class=MsoNormal>The Forescout NAC device is vulnerable \
to two cross-site scripting issues and could be used to redirect a targetted victim to a \
malicious site or gain access to the NAC admin console. The 'a' parameter is vulnerable on the \
'login' page and the search page 'rangesearch' is vulnerable to authenticated users. See below \
for details: <o:p></o:p></p><p class=MsoNormal><o:p>&nbsp;</o:p></p><p class=MsoNormal>Login \
page:<o:p></o:p></p><p class=MsoNormal>http://(NACIP)/assets/login?a=asdf&quot; \
onload=&quot;alert(123)&quot;&gt;<o:p></o:p></p><p class=MsoNormal><o:p>&nbsp;</o:p></p><p \
class=MsoNormal>Search field (needs authenticated user):<o:p></o:p></p><p \
class=MsoNormal>http://(NACIP)/assets/rangesearch?fromIndex=0&amp;query=asdf&quot; \
onclick=&quot;alert(123)&quot;&amp;main_selection=all<o:p></o:p></p><p \
class=MsoNormal><o:p>&nbsp;</o:p></p><p class=MsoNormal><o:p>&nbsp;</o:p></p><p \
class=MsoNormal>Forescout NAC ICMP and ARP Protocols Not Filtered Vulnerability Advisory \
(CVE-2012-4985)<o:p></o:p></p><p class=MsoNormal><o:p>&nbsp;</o:p></p><p \
class=MsoNormal>Forescout NAC (Network Access Control) device is vulnerable to ICMP and ARP \
protocol filter bypass. The NAC does not filter traffic from unknown clients over these \
protocols. An attacker with an unauthorised device can engage ARP poisoning attacks and \
potentially gain access to cleartext login credentials traversing the network (where cleartext \
protocols are employed). The attacker could then use these credentials via an authorised \
terminal/workstation to gain full access to the network.<o:p></o:p></p><p class=MsoNormal><span \
style='color:#1F497D;mso-fareast-language:EN-GB'><o:p>&nbsp;</o:p></span></p><p \
class=MsoNormal><a href="http://www.reactionpenetrationtesting.co.uk/forescout-cross-site-redire \
ction.html">http://www.reactionpenetrationtesting.co.uk/forescout-cross-site-redirection.html</a><o:p></o:p></p><p \
class=MsoNormal><a href="http://www.reactionpenetrationtesting.co.uk/forescout-nac-xss.html">htt \
p://www.reactionpenetrationtesting.co.uk/forescout-nac-xss.html</a><o:p></o:p></p><p \
class=MsoNormal><a href="http://www.reactionpenetrationtesting.co.uk/forescout-nac-icmp-arp.html">http://www.reactionpenetrationtesting.co.uk/forescout-nac-icmp-arp.html</a> \
<o:p></o:p></p><p class=MsoNormal><span \
style='color:#1F497D;mso-fareast-language:EN-GB'><o:p>&nbsp;</o:p></span></p><p \
class=MsoNormal><span \
style='color:#1F497D;mso-fareast-language:EN-GB'><o:p>&nbsp;</o:p></span></p><p \
class=MsoNormal><span \
style='color:#1F497D;mso-fareast-language:EN-GB'><o:p>&nbsp;</o:p></span></p><p \
class=MsoNormal><span \
style='color:#1F497D;mso-fareast-language:EN-GB'><o:p>&nbsp;</o:p></span></p><p \
class=MsoNormal><span style='color:#1F497D;mso-fareast-language:EN-GB'>Best \
regards,<o:p></o:p></span></p><p class=MsoNormal><span \
style='color:#1F497D;mso-fareast-language:EN-GB'><o:p>&nbsp;</o:p></span></p><p \
class=MsoNormal><span \
style='color:#1F497D;mso-fareast-language:EN-GB'>Joe<o:p></o:p></span></p><p \
class=MsoNormal><span \
style='color:#1F497D;mso-fareast-language:EN-GB'><o:p>&nbsp;</o:p></span></p><p \
class=MsoNormal><span style='color:#1F497D;mso-fareast-language:EN-GB'>Joseph \
Sheridan<o:p></o:p></span></p><p class=MsoNormal><span \
style='color:#1F497D;mso-fareast-language:EN-GB'>Director<o:p></o:p></span></p><p \
class=MsoNormal><span style='color:#1F497D;mso-fareast-language:EN-GB'>CHECK Team Leader, CREST \
Infrastructure, CREST Application, CISSP<o:p></o:p></span></p><p class=MsoNormal><span \
style='color:#1F497D;mso-fareast-language:EN-GB'>Tel: 07812052515<o:p></o:p></span></p><p \
class=MsoNormal><span style='color:#1F497D;mso-fareast-language:EN-GB'>Web: <a \
href="http://www.reactionis.co.uk"><span style='color:blue'>www.reactionis.co.uk</span></a> \
<o:p></o:p></span></p><p class=MsoNormal><span \
style='color:#1F497D;mso-fareast-language:EN-GB'>Email: \
joe@reactionis.co.uk<o:p></o:p></span></p><p class=MsoNormal><span \
style='color:#1F497D;mso-fareast-language:EN-GB'><img border=0 width=273 height=107 \
id="Picture_x0020_1" src="cid:image001.png@01CDCBF2.5FFC3220" \
alt=Reaction-White-small><o:p></o:p></span></p><p class=MsoNormal><span \
style='font-size:10.0pt;font-family:"Arial","sans-serif";color:#1F497D;mso-fareast-language:EN-GB'>Reaction \
Information Security Limited.</span><span \
style='color:#1F497D;mso-fareast-language:EN-GB'><o:p></o:p></span></p><p class=MsoNormal><span \
style='font-size:10.0pt;font-family:"Arial","sans-serif";color:#1F497D;mso-fareast-language:EN-GB'>Registered \
in England No: </span><span \
style='color:#1F497D;mso-fareast-language:EN-GB'>6929383</span><span \
style='font-size:10.0pt;font-family:"Arial","sans-serif";color:#1F497D;mso-fareast-language:EN-GB'><o:p></o:p></span></p><p \
class=MsoNormal><span \
style='font-size:10.0pt;font-family:"Arial","sans-serif";color:#1F497D;mso-fareast-language:EN-GB'>Registered \
Office: 1, The Mews, 69 New Dover Road, Canterbury, CT1 3DZ<o:p></o:p></span></p><p \
class=MsoNormal><span \
style='font-size:10.0pt;font-family:"Arial","sans-serif";color:#1F497D;mso-fareast-language:EN-GB'>&nbsp;<o:p></o:p></span></p><p \
class=MsoNormal><span \
style='font-size:10.0pt;font-family:"Arial","sans-serif";color:#1F497D;mso-fareast-language:EN-GB'>This \
email and any files transmitted with it are confidential and are intended solely for the use of \
the individual to whom they are addressed. If you are not the intended recipient please notify \
the sender. Any unauthorised dissemination or copying of this email or its attachments and any \
use or disclosure of any information contained in them, is strictly \
prohibited.<o:p></o:p></span></p><p class=MsoNormal><span \
style='mso-fareast-language:EN-GB'><o:p>&nbsp;</o:p></span></p><p class=MsoNormal><span \
style='font-size:18.0pt;font-family:Webdings;color:#00B050;mso-fareast-language:EN-GB'>P</span><span \
style='font-size:18.0pt;color:#00B050;mso-fareast-language:EN-GB'> </span><span \
style='font-size:10.0pt;color:#00B050;mso-fareast-language:EN-GB'>Please consider the \
environment before printing this email</span><span \
style='font-size:18.0pt;color:#00B050;mso-fareast-language:EN-GB'><o:p></o:p></span></p><p \
class=MsoNormal><o:p>&nbsp;</o:p></p></div></body></html>


["image001.png" (image/png)]

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic