{"vuid":"VU#485324","idnumber":"485324","name":"ANTLabs InnGate gateway device contains SQL injection and reflected cross-site scripting vulnerabilities","keywords":["sqli","xss","antlabs","CWE-89","CWE-79","gateway"],"overview":"ANTlabs InnGate is a gateway device designed for operating corporate guest/visitor networks. Multiple InnGate models have been confirmed to be vulnerable to SQL injection and cross-site scripting attacks.","clean_desc":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') -  CVE-2015-2849 The ppli URL parameter of the main.ant page is vulnerable to SQL injection. A remote attacker can perform arbitrary queries on the underlying database. According to ANTLabs, only https connections are vulnerable to this attack. CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE-2015-2850 A reflected cross-site scripting vulnerability also exists in the msg URL parameter of the index-login.ant page. Affected models include the following: InnGate 3.01 E-Series\nInnGate 3.10 E-Series\nInnGate 3.10 M-Series\nIG3100\nSG 4\nSSG 4 The CVSS score below is based on CVE-2015-2849.","impact":"A remote attacker may be able exploit CVE-2015-2849 to execute arbitrary queries on the backend datastore. A remote attacker may be able to exploit CVE-2015-2850 to obtain user credentials to the administrator panel if a user can be enticed to click an XSS-injected link.","resolution":"Apply an update ANTLabs has released a firmware update addressing these issues for affected models. All affected users are encouraged to update as soon as possible. The update is available on the ANTlabs customer portal or via the system update mechanism.","workarounds":"","sysaffected":"","thanks":"Thanks to Devesh Logendran for reporting these vulnerabilities.","author":"This document was written by Garret Wassermann.","public":[],"cveids":["CVE-2015-2849","CVE-2015-2850"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-04-14T13:26:27Z","publicdate":"2015-07-06T00:00:00Z","datefirstpublished":"2015-07-06T17:12:59Z","dateupdated":"2015-07-06T17:17:17Z","revision":43,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"A","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.8","cvss_basevector":"AV:A/AC:L/Au:N/C:C/I:C/A:N","cvss_temporalscore":"6.1","cvss_environmentalscore":"4.56292743292512","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}