Vulnerability Note VU#813382

Dell KACE K1000 management appliance contains a cross-site scripting vulnerability

Original Release date: 04 Feb 2014 | Last revised: 11 Feb 2014

Overview

Dell KACE K1000 management appliance version 5.5.90545, and possibly earlier versions, contains a cross-site scripting (XSS) vulnerability. (CWE-79)

Description

Dell KACE K1000 management appliance version 5.5.90545, and possibly earlier versions, contains a cross-site scripting (XSS) vulnerability. The "LABEL_ID" parameter in the "adminui/user_list.php" page is vulnerable.

Proof-of-Concept:
hxxp://ip_KACE/adminui/user_list.php?SEARCH_SELECTION=&LABEL_ID=aaas"><script>alert("XSS");</script>&&PAGE=2

Impact

A remote unauthenticated attacker may be able to execute arbitrary script in the context of the end-user's browser session.

Solution

Dell has provided this response to the vulnerability. Also, please consider the following workaround.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the interface using stolen credentials from a blocked network location.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Dell Computer Corporation, Inc.Affected03 Feb 201411 Feb 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 4.3 AV:N/AC:M/Au:N/C:P/I:N/A:N
Temporal 3.5 E:U/RL:W/RC:C
Environmental 3.5 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to William Costa for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs: CVE-2014-0330
  • Date Public: 03 Feb 2014
  • Date First Published: 04 Feb 2014
  • Date Last Updated: 11 Feb 2014
  • Document Revision: 25

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.