{"vuid":"VU#203844","idnumber":"203844","name":"SolarWinds Orion IPAM web interface reflected xss vulnerability","keywords":["SolarWinds","Orion","IPAM","xss","cwe-79"],"overview":"SolarWinds Orion IPAM web interface contains a reflected cross-site scripting vulnerability.","clean_desc":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nSolarWinds Orion IPAM web interface contains a reflected cross-site scripting vulnerability. It has been reported that input fields are not sanitized allowing for authenticated users to execute scripts against the SolarWinds Orion IPAM web interface Attack scenario: 1. http://[server name]/Orion/IPAM/IPAMSummaryView.aspx\n2. Enter the following in the \"Search for an IP address\" field: \"></script><script>alert('hi')</script>\n3. Click Search, which will redirect you to the following URL:http://[server name]/Orion/IPAM/search.aspx?q=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28%27hi%27%29%3C%2Fscript%3E","impact":"An attacker with access to the SolarWinds Orion IPAM  web interface can conduct a reflected cross-site scripting attack, which could be used to result in information leakage, privilege escalation, and/or denial of service.","resolution":"Apply Hotfix The vendor has stated this vulnerability has been addressed in IPAM-v3.0-HotFix1. Users are advised to apply the hotfix. The vendor has stated this hotfix will be incorporated in the next version of IPAM v3.1, due this quarter and that customers under maintenance can get access to this hot fix via their SolarWinds Customer Portal.","workarounds":"Restrict access As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS, CSRF, or SQLi attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the SolarWinds Orion IPAM web interface using stolen credentials from a blocked network location.","sysaffected":"","thanks":"Thanks to Anthony Trummer for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["h","t","t","p",":","/","/","c","w","e",".","m","i","t","r","e",".","o","r","g","/","d","a","t","a","/","d","e","f","i","n","i","t","i","o","n","s","/","7","9",".","h","t","m","l"],"cveids":["CVE-2012-4939"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-08-01T19:25:26Z","publicdate":"2012-10-31T00:00:00Z","datefirstpublished":"2012-10-31T11:49:05Z","dateupdated":"2012-10-31T14:32:34Z","revision":11,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"W","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"L","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"3.5","cvss_basevector":"AV:N/AC:M/Au:S/C:P/I:N/A:N","cvss_temporalscore":"2.7","cvss_environmentalscore":"0.9","cvss_environmentalvector":"CDP:L/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}