PT-2011-07: Cross-Site Scripting in Cisco Small Business Devices

(PT-2011-07) Positive Technologies Security Advisory
Cross-Site Scripting in Cisco Small Business Devices

Vulnerable products

Cisco SPA8000 8-port IP Telephony Gateway 6.1.10 and earlier
Cisco SPA8800 IP Telephony Gateway 6.1.7 and earlier
Cisco SPA2102 Phone Adapter with Router 5.2.12 and earlier
Cisco SPA3102 Voice Gateway with Router 5.1.10 and earlier
Cisco Small Business SPA500 Series IP Phones 7.4.8a and earlier

Link:
http://www.cisco.com/

Severity level

Severity level: Medium
Impact: Cross-Site Scripting
Access Vector: Remote

CVSS v2:
Base Score: 4.3
Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVE: CVE-2011-2545

Product description

Cisco Small Business IP Telephony devices are intended for high-volume deployments by VoIP service providers to residential and small business customers.

Vulnerability description

The specialists of the Positive Research center have detected "Cross-Site Scripting" vulnerability in Cisco Small Business Devices.

User input passed to "Display name" and "User ID" parameters of SIP INVITE request "FROM" field is not properly sanitized. This can be exploited to inject malicious code and allows to execute arbitrary HTML and script code in user/admin browser session in context of IP phone's web management console (Call Log).
Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool users in order to gather data from their machines. An attacker can steal the session cookie and take over the account impersonating the user. It is also possible to modify page content presented to the user.

How to fix

Cisco customers with active contracts can obtain updates through the Software Center at the following link: Cisco
Cisco customers without contracts can obtain upgrades by contacting the Cisco Technical Assistance Center via e-mail at tac@cisco.com.

Advisory status

23.06.2011 - Vendor is notified
24.06.2011 - Vendor gets vulnerability details
12.06.2012 - Vendor releases fixed version and details
27.09.2012 - Public disclosure

Credits

The vulnerability has discovered by Alexander Zaitsev, Gleb Gritsai, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2011-07
http://tools.cisco.com/security/center/viewAlert.x?alertId=26037

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

About Positive Technologies

Positive Technologies www.ptsecurity.com is among the key players in the IT security market in Russia.

The principal activities of the company include the development of integrated tools for information security monitoring (MaxPatrol); providing IT security consulting services and technical support; development of the Securitylab leading Russian information security portal.

Among the clients of Positive Technologies, there are more than 40 state enterprises, more than 50 banks and financial organizations, 20 telecommunication companies, more than 40 plant facilities, as well as IT, service and retail companies from Russia, the CIS countries, the Baltic States, China, Ecuador, Germany, Great Britain, Holland, Iran, Israel, Japan, Mexico, the Republic of South Africa, Thailand, Turkey, and the USA.

Positive Technologies is a team of highly skilled developers, advisers and experts with years of vast hands-on experience. The company specialists possess professional titles and certificates; they are the members of various international societies and are actively involved in the IT security field development.