deveverything

Summary

Name: Tripwire Enterprise/Server XSS Vulnerability
Release Date: 29 January 2008
Reference: LSD001-2008
Discover: Dave Lewis
Vendor: Tripwire
Product: Tripwire Enterprise/Server Management Web Interface
Systems Affected: version 7.0 (as tested)
NB. Earlier versions are affected as well. Please upgrade.

Risk: Less Critical
Status: Published
Reference:
http://www.liquidmatrix.org/blog/2008/01/29/advisory-tripwire-…ility/

Description

The Tripwire Enterprise management login page contains a vulnerability which is susceptible to a cross site scripting (XSS) attack.

Impact: a remote attacker could execute a XSS attack that could pass arbitrary html to the user.

Technical Details

Input passed to the URL of the web management login page is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

Fix Information

This issue has been resolved.

The patch may be obtained from:

http://www.tripwire.com (Patch 866 “te-7.0.0.866_patch.zip”)

Notes

I would like to thank the Tripwire team for their professionalism. I should note that the release of this advisory does not in any way negatively alter my view that Tripwire is a great audit and control suite.

Liquidmatrix Security Digest

http://www.liquidmatrix.org/blog/

2255B Queen Street East
suite 156
Toronto, Ontario
Canada
M4E 1G3

[tags]Security Advisory, Advisory, Triwpire, Tripwire Enterprise[/tags]

Comments
  • Mike

    Your reference link (to the 12/10/2007 blog entry) returns page not found.

  • Dave Lewis

    @Mike

    Augh! Thanks for the heads up. I have fixed the link on the site.

  • Dan Schoenbaum

    Dave, thanks for the kind words. Glad we were able to help

    Dan Schoenbaum, SVP Marketing & Business Development
    Tripwire, Inc.

  • Dave Lewis

    @Dan

    Thanks for the note. You have a great team.

Leave a Comment

Who are you?

Your message.