Kaspersky Anti-Virus up to 8.0.4 scriptName cross site scripting
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.0 | $0-$5k | 0.00 |
A vulnerability was found in Kaspersky Anti-Virus up to 8.0.4 (Anti-Malware Software). It has been rated as problematic. This issue affects an unknown function. The manipulation of the argument scriptName
as part of a Parameter leads to a cross site scripting vulnerability. Using CWE to declare the problem leads to CWE-79. The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Impacted is integrity. The summary by CVE is:
In Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312), the scriptName parameter of the licenseKeyInfo action method is vulnerable to cross-site scripting (XSS).
The bug was discovered 06/28/2017. The weakness was presented 07/17/2017 by Core Security with Core Security Consulting Services as confirmed mailinglist post (Full-Disclosure). The advisory is shared at seclists.org. The identification of this vulnerability is CVE-2017-9813 since 06/22/2017. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. It demands that the victim is doing some kind of user interaction. Technical details as well as a public exploit are known. MITRE ATT&CK project uses the attack technique T1059.007 for this issue.
A public exploit has been developed by Core Security and been published even before and not after the advisory. The exploit is available at exploit-db.com. It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 19 days. During that time the estimated underground price was around $5k-$25k.
Upgrading to version 8.0.4.312) eliminates this vulnerability. Attack attempts may be identified with Snort ID 43813.
The vulnerability is also documented in the vulnerability database at Exploit-DB (42269). See 103730, 103731 and 103732 for similar entries.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.2VulDB Meta Temp Score: 5.0
VulDB Base Score: 4.3
VulDB Temp Score: 3.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 6.1
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cross site scriptingCWE: CWE-79 / CWE-74 / CWE-707
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Author: Core Security
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Anti-Virus 8.0.4.312)
Snort ID: 43813
Snort Message: SERVER-WEBAPP Kaspersky Linux File Server WMC cross site scripting attempt
Snort Class: 🔍
Timeline
06/22/2017 🔍06/28/2017 🔍
06/28/2017 🔍
06/28/2017 🔍
06/29/2017 🔍
07/17/2017 🔍
07/17/2017 🔍
07/18/2017 🔍
12/13/2022 🔍
Sources
Vendor: kaspersky.comAdvisory: 143190
Researcher: Core Security
Organization: Core Security Consulting Services
Status: Confirmed
CVE: CVE-2017-9813 (🔍)
SecurityTracker: 1038798
SecurityFocus: 99330 - Kaspersky Anti-Virus for Linux File Server Multiple Security Vulnerabilities
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 07/18/2017 11:23Updated: 12/13/2022 08:48
Changes: 07/18/2017 11:23 (77), 10/27/2019 07:50 (2), 01/01/2021 18:36 (2), 12/13/2022 08:48 (3)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.