{"vuid":"VU#697316","idnumber":"697316","name":"SearchBlox contains multiple vulnerabilities","keywords":["xss","unrestricted file upload","information exposure","csrf"],"overview":"SearchBlox versions 8.1.x and below contain multiple vulnerabilities.","clean_desc":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE-2015-0967 SearchBlox contains multiple cross-site scripting (XSS) vulnerabilities, including a reflected XSS in the default search box of http://<HOST_NAME>:8080/searchblox/plugin/index.html and a persistent XSS in the title field of the 'Create Featured Result' form, http://<HOST_NAME>:8080/searchblox/admin/main.jsp?menu1=res. Note that an attacker must be authenticated to leverage the persistent XSS. CWE-434: Unrestricted File Upload of File with Dangerous Type - CVE-2015-0968 Active content, such as JSP pages, can be uploaded to http://<HOST_NAME>:8080/searchblox/admin/uploadImage.html. This can be done by submitting the content using the form and using a client proxy to ensure that the \"Content-Type\" for the uploaded file is \"image/jpeg\". The attacker can then visit the uploaded content and enable its execution. Note that though the URL in question appears to be in an authenticated portion of the server, the page can be accessed without authentication. This issue was previously published in VU#592942 (see CVE-2013-3590) and reportedly addressed in version 7.5 build 1. SearchBlox 8.1.5 and possibly earlier versions have since been found to be vulnerable. CWE-200: Information Exposure - CVE-2015-0969 Potentially sensitive information can be viewed by unauthenticated users who directly access http://<HOST_NAME>:9200/_cluster/health?pretty=true. CWE-352: Cross-Site Request Forgery (CSRF) - CVE-2015-0970 SearchBlox contains a global cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. The CVSS score below describes CVE-2015-0968.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary script in the contexts of the end-user's browser session, the application, or an authenticated user. Sensitive information may be exposed to unauthenticated users.","resolution":"Apply an update SearchBlox has addressed these issues in version 8.2.","workarounds":"","sysaffected":"","thanks":"Thanks to Ashish Kamble of Qualys for reporting this vulnerability.","author":"This document was written by Joel Land.","public":["http://www.searchblox.com/downloads","http://www.kb.cert.org/vuls/id/592942","http://cwe.mitre.org/data/definitions/79.html","https://cwe.mitre.org/data/definitions/434.html","http://cwe.mitre.org/data/definitions/200.html","http://cwe.mitre.org/data/definitions/352.html"],"cveids":["CVE-2015-0967","CVE-2015-0968","CVE-2015-0969","CVE-2015-0970"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-02-12T13:02:53Z","publicdate":"2015-04-14T00:00:00Z","datefirstpublished":"2015-04-14T13:59:14Z","dateupdated":"2015-04-14T13:59:14Z","revision":14,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"LM","cvss_targetdistribution":"M","cvss_securityrequirementscr":"M","cvss_securityrequirementsir":"M","cvss_securityrequirementsar":"M","cvss_basescore":"7.5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvss_temporalscore":"6.2","cvss_environmentalscore":"5.49768713858288","cvss_environmentalvector":"CDP:LM/TD:M/CR:M/IR:M/AR:M","metric":0.0,"vulnote":null}