Vigil@nce - RiverBed Stingray Traffic Manager: Cross Site Scripting of locallog.cgi
September 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Scripting in locallog.cgi of
RiverBed Stingray Traffic Manager, in order to execute JavaScript
code in the context of the web site.
– Impacted products: SteelApp Traffic Manager
– Severity: 2/4
– Creation date: 18/08/2014
DESCRIPTION OF THE VULNERABILITY
The RiverBed Stingray Traffic Manager product offers a web service.
However, it does not filter received data in the parameter logfile
for the URL /apps/zxtm/locallog.cgi before inserting them in
generated HTML documents.
An attacker can therefore trigger a Cross Site Scripting in
locallog.cgi of RiverBed Stingray Traffic Manager, in order to
execute JavaScript code in the context of the web site.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN