VAR-190001-0525

Vulnerability from variot - Updated: 2022-05-17 01:47

The Cyclope Internet Filtering Proxy monitors the entire Internet traffic and blocks access to websites and files based on selected filtering criteria. The web-based management console lacks sufficient filtering for input and there is a cross-site scripting vulnerability. Whitelist and blacklist modes are affected by this vulnerability. Sending the malicious script code USERCOMPUTERIP ADDY\n to the default record port 8585 in the correct order, resulting in an XSS attack due to no filtering. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-190001-0525",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cyclope internet filtering proxy",
        "scope": null,
        "trust": 0.6,
        "vendor": "amplusnet group",
        "version": null
      },
      {
        "model": "cyclope internet filtering proxy",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "amplusnet",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-4377"
      },
      {
        "db": "BID",
        "id": "50317"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "loneferret",
    "sources": [
      {
        "db": "BID",
        "id": "50317"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-532"
      }
    ],
    "trust": 0.9
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Cyclope Internet Filtering Proxy monitors the entire Internet traffic and blocks access to websites and files based on selected filtering criteria. The web-based management console lacks sufficient filtering for input and there is a cross-site scripting vulnerability. Whitelist and blacklist modes are affected by this vulnerability. Sending the malicious script code \u003cuser\u003eUSER\u003c/user\u003e\u003ccomputer\u003eCOMPUTER\u003c/computer\u003e\u003cip\u003eIP ADDY\u003c/ip\u003e\\\\n to the default record port 8585 in the correct order, resulting in an XSS attack due to no filtering. \nAn attacker may leverage this issue to execute arbitrary script code in  the browser of an unsuspecting user in the context of the affected site.  This may let the attacker steal cookie-based authentication credentials  and launch other attacks",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-4377"
      },
      {
        "db": "BID",
        "id": "50317"
      }
    ],
    "trust": 0.81
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "50317",
        "trust": 1.5
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-4377",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-532",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-4377"
      },
      {
        "db": "BID",
        "id": "50317"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-532"
      }
    ]
  },
  "id": "VAR-190001-0525",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-4377"
      }
    ],
    "trust": 1.1833333000000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-4377"
      }
    ]
  },
  "last_update_date": "2022-05-17T01:47:41.312000Z",
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/bid/50317"
      },
      {
        "trust": 0.3,
        "url": "http://www.cyclope-series.com/download/index.aspx?p=2"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-4377"
      },
      {
        "db": "BID",
        "id": "50317"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-532"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-4377"
      },
      {
        "db": "BID",
        "id": "50317"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-532"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-10-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-4377"
      },
      {
        "date": "2011-10-20T00:00:00",
        "db": "BID",
        "id": "50317"
      },
      {
        "date": "1900-01-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201110-532"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-10-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-4377"
      },
      {
        "date": "2011-10-20T00:00:00",
        "db": "BID",
        "id": "50317"
      },
      {
        "date": "2011-10-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201110-532"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-532"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cyclope Internet Filtering Proxy \u0027user\u0027 HTML Injection Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-4377"
      },
      {
        "db": "BID",
        "id": "50317"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "code injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201110-532"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…