Thycotic, a maker of access-control and other security products, has patched a stored cross-site scripting vulnerability in one of its products that could enable an attacker to steal a victimâs stored passwords.
The vulnerability is in the companyâs Secret Server product, which is designed to provide password management for enterprises. Marco Delai, a researcher at Compass Security in Switzerland, discovered the stored XSS flaw in the software and reported it to the company.
[adsense size='1']
âThe identified vulnerability (stored Cross-Site Scripting) allows the execution of JavaScript code in the browser of a valid user when it toggle the password mask on a specially crafted password. This allows, for example, an attacker to prepare a specially crafted shared password, which when read by another user, can steal all other passwords the victim has access to,â the advisory says.
The bug affects versions 8.6.000000 to 8.8.000004 of Thycotic Secret Server and is patched in version 8.8.000005.
Delai said in the advisory that exploiting the vulnerability is a simple process.
âCreate a new password entry within Secret Server with the following value: âCompass Security<script>alert(âCompass Securityâ)<aLVJvtEl.jpgscript>â. Open the basic dashboard and toggle the password mask. The password is retrieved from the server using an AJAX call and its value is added straight to the pageâs DOM without validation. Thus, the script included in step 1 is executed,â the advisory says.
[adsense size='1']
Stored XSS attacks involve an attacker storing the malicious code o a target server, which the victim then hits at some point, leading to the exploit of the vulnerability.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkNoRead More
You can revoke your consent any time using the Revoke consent button.Revoke consent
Gloss