ID

VAR-201209-0281


CVE

CVE-2012-5004


TITLE

Parallels H-Sphere Cross-Site Request Forgery Vulnerability

Trust: 0.8

sources: IVD: 5ca6248e-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-5307

DESCRIPTION

Multiple cross-site request forgery (CSRF) vulnerabilities in Parallels H-Sphere 3.3 Patch 1 allow remote attackers to hijack the authentication of admins for requests that (1) add group plans via admin/group_plans.html or (2) add extra packages via admin/extra_packs/create_extra_pack.html. Parallels H-Sphere offers multi-server host automation solutions for Linux, BSD and Windows platforms. A cross-site request forgery vulnerability exists in Parallels H-Sphere. Allows an attacker to build a malicious URI, entice a user to resolve, and perform malicious actions in the target user context. H-Sphere includes its own controls panels, automated billing, and provisioning solution in a single integrated system. It is scalable to any number of boxes — more Web, mail, database, and Windows hosting servers can be added without downtime. Abstract: ========= A Vulnerability Laboratory researcher discovered multiple persistant cross site scripting vulnerabilities on Parallels H-Sphere 3.3 Patch1. Report-Timeline: ================ 2012-01-22: Public or Non-Public Disclosure Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= Medium Details: ======== Multiple persistant cross site scripting vulnerabilities where detected on Parallels H-Sphere 3.3 Patch1. These vulnerabilities allow an remote attacker to hijack customer sessions via persistent cross site scripting. Successful exploitation can result in account steal, client side exploitation or phishing & session hijacking. These bugs are located on the admin panel of Parallels H-Sphere 3.3 Patch1. Vulnerbale Module(s): [+] Group Module [+] Extra Package Module Picture(s): ../1.png ../2.png Proof of Concept: ================= The vulnerability can be exploited by remote attackers with high account privileges(mod/admin) & required user inter action. For demonstration or reproduce ... [Poc 1] Open Link: http://demo.psoft.net/psoft/servlet/psoft.hsphere.CP/admin/1_0/psoft.hsphere.CP?template_name=admin/group_plans.html choose admin post xss on Group Name: <IFRAME SRC="javascript:alert('XSS');"></IFRAME> press add group. Result XSS! [Poc 2] Open link: http://demo.psoft.net/psoft/servlet/psoft.hsphere.CP/admin/1_0/psoft.hsphere.CP?template_name=admin/extra_packs/create_extra_pack.html Extra Pack Name put xss code: <IFRAME SRC="javascript:alert('XSS');"></IFRAME> Extra Package Prices set fee 1 recurrent fee 1 just click submit you will see result. Risk: ===== The security risk of the persistant cross site scripting vulnerabilities are estimated as medium(-). Credits: ======== Vulnerability Research Laboratory - Ucha Gobejishvili (longrifle0x) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab or its suppliers. Copyright © 2012|Vulnerability-Lab -- Website: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com Contact: admin@vulnerability-lab.com or support@vulnerability-lab.com . ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Parallels H-Sphere Cross-Site Request Forgery Vulnerability SECUNIA ADVISORY ID: SA47556 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47556/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47556 RELEASE DATE: 2012-01-24 DISCUSS ADVISORY: http://secunia.com/advisories/47556/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47556/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47556 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Vulnerability Lab has reported a vulnerability in Parallels H-Sphere, which can be exploited by malicious people to conduct cross-site request forgery attacks. The application's web interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to e.g. add extra packages and group plans and conduct script insertion attacks by tricking a logged in user into visiting a malicious web site. The vulnerability is reported in version 3.3 Patch 1. Other versions may also be affected. SOLUTION: Do not browse untrusted websites or follow untrusted links while logged in to the application. ORIGINAL ADVISORY: http://www.vulnerability-lab.com/get_content.php?id=392 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.52

sources: NVD: CVE-2012-5004 // JVNDB: JVNDB-2012-004516 // CNVD: CNVD-2012-5307 // IVD: 5ca6248e-2353-11e6-abef-000c29c66e3d // PACKETSTORM: 108972 // PACKETSTORM: 109047

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 5ca6248e-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-5307

AFFECTED PRODUCTS

vendor:parallelsmodel:h-spherescope:eqversion:3.3

Trust: 1.6

vendor:parallelsmodel:h-spherescope:eqversion:3.3 patch 1

Trust: 0.8

vendor:parallelsmodel:h-sphere patchscope:eqversion:3.31

Trust: 0.6

vendor:h spheremodel: - scope:eqversion:3.3

Trust: 0.2

sources: IVD: 5ca6248e-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-5307 // JVNDB: JVNDB-2012-004516 // CNNVD: CNNVD-201209-414 // NVD: CVE-2012-5004

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-5004
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-5004
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201209-414
value: MEDIUM

Trust: 0.6

IVD: 5ca6248e-2353-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2012-5004
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 5ca6248e-2353-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 5ca6248e-2353-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2012-004516 // CNNVD: CNNVD-201209-414 // NVD: CVE-2012-5004

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.8

sources: JVNDB: JVNDB-2012-004516 // NVD: CVE-2012-5004

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201209-414

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201209-414

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004516

PATCH

title:Parallels H-Sphereurl:http://www.parallels.com/jp/products/hsphere/

Trust: 0.8

sources: JVNDB: JVNDB-2012-004516

EXTERNAL IDS

db:NVDid:CVE-2012-5004

Trust: 3.2

db:SECUNIAid:47556

Trust: 2.3

db:PACKETSTORMid:108972

Trust: 1.7

db:OSVDBid:78505

Trust: 1.6

db:CNVDid:CNVD-2012-5307

Trust: 0.8

db:CNNVDid:CNNVD-201209-414

Trust: 0.8

db:JVNDBid:JVNDB-2012-004516

Trust: 0.8

db:XFid:72628

Trust: 0.6

db:IVDid:5CA6248E-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:109047

Trust: 0.1

sources: IVD: 5ca6248e-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-5307 // JVNDB: JVNDB-2012-004516 // PACKETSTORM: 108972 // PACKETSTORM: 109047 // CNNVD: CNNVD-201209-414 // NVD: CVE-2012-5004

REFERENCES

url:http://www.vulnerability-lab.com/get_content.php?id=392

Trust: 1.8

url:http://secunia.com/advisories/47556

Trust: 1.6

url:http://packetstormsecurity.org/files/view/108972/vl-392.txt

Trust: 1.6

url:http://osvdb.org/78505

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/72628

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5004

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5004

Trust: 0.8

url:http://secunia.com/advisories/47556http

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/72628

Trust: 0.6

url:http://demo.psoft.net/psoft/servlet/psoft.hsphere.cp/admin/1_0/psoft.hsphere.cp?template_name=admin/group_plans.html

Trust: 0.1

url:http://demo.psoft.net/psoft/servlet/psoft.hsphere.cp/admin/1_0/psoft.hsphere.cp?template_name=admin/extra_packs/create_extra_pack.html

Trust: 0.1

url:http://secunia.com/company/jobs/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/47556/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/47556/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47556

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-5307 // JVNDB: JVNDB-2012-004516 // PACKETSTORM: 108972 // PACKETSTORM: 109047 // CNNVD: CNNVD-201209-414 // NVD: CVE-2012-5004

CREDITS

longrifle0x

Trust: 0.1

sources: PACKETSTORM: 108972

SOURCES

db:IVDid:5ca6248e-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-5307
db:JVNDBid:JVNDB-2012-004516
db:PACKETSTORMid:108972
db:PACKETSTORMid:109047
db:CNNVDid:CNNVD-201209-414
db:NVDid:CVE-2012-5004

LAST UPDATE DATE

2025-04-11T22:49:25.080000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-5307date:2012-09-21T00:00:00
db:JVNDBid:JVNDB-2012-004516date:2012-09-21T00:00:00
db:CNNVDid:CNNVD-201209-414date:2012-09-25T00:00:00
db:NVDid:CVE-2012-5004date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:5ca6248e-2353-11e6-abef-000c29c66e3ddate:2012-09-21T00:00:00
db:CNVDid:CNVD-2012-5307date:2012-09-21T00:00:00
db:JVNDBid:JVNDB-2012-004516date:2012-09-21T00:00:00
db:PACKETSTORMid:108972date:2012-01-23T16:23:31
db:PACKETSTORMid:109047date:2012-01-24T01:28:43
db:CNNVDid:CNNVD-201209-414date:2012-09-21T00:00:00
db:NVDid:CVE-2012-5004date:2012-09-19T21:55:07.750