perfsonar-user - [perfsonar-user] Fwd: [ISOTicket:1684893] UT/ISO -- Verified Vulnerable Web Page [129.74.85.59 - ND.EDU]
Subject: perfSONAR User Q&A and Other Discussion
List archive
[perfsonar-user] Fwd: [ISOTicket:1684893] UT/ISO -- Verified Vulnerable Web Page [129.74.85.59 - ND.EDU]
Chronological Thread
- From: Matt Vander Werf <>
- To:
- Cc: Rich Sudlow <>
- Subject: [perfsonar-user] Fwd: [ISOTicket:1684893] UT/ISO -- Verified Vulnerable Web Page [129.74.85.59 - ND.EDU]
- Date: Tue, 11 Jul 2017 16:47:21 -0400
- Ironport-phdr: 9a23:n9GzBR8TpuT5N/9uRHKM819IXTAuvvDOBiVQ1KB90O4cTK2v8tzYMVDF4r011RmSAtWdtqoMotGVmp6jcFRI2YyGvnEGfc4EfD4+ouJSoTYdBtWYA1bwNv/gYn9yNs1DUFh44yPzahANS47WLmffqXyq7DMUBg63dU8sfry0Scbvid+q3bW38pzXfwIahTyzZqh/J1C5twLMrooLh5B/IL060BrDr1NOd6JbyX47GVXGhxvm6Ny3+pd5tjlLtugJ9shcXL/8crhiC7FUEWcIKWcwsejiqQWLcwKJ6nYGGlobiBQAVw3b5Rf2U43umi328OdxxX/JboXNUbkoVGH6vO9QQxjyhXJCbmZh/Q==
Hello,
Please see the report below of a cross-site scripting security vulnerability found in the MaDDash software we have installed on one of our systems. This report came from the Information Security Office at the University of Texas at Austin.--
Matt Vander Werf
HPC System Administrator
University of Notre Dame
Center for Research Computing - Union Station
506 W. South Street
South Bend, IN 46601
HPC System Administrator
University of Notre Dame
Center for Research Computing - Union Station
506 W. South Street
South Bend, IN 46601
...
---------- Forwarded message ----------
From: UT Information Security Office <>
Date: Mon, Jul 10, 2017 at 9:00 PM
Subject: [ISOTicket:1684893] UT/ISO -- Verified Vulnerable Web Page [129.74.85.59 - ND.EDU]
To:
=========================================================
THE FOLLOWING ALERT IS THE PRODUCT OF A VULNERABILITY
DETECTION SERVICE SPONSORED BY U.T. AUSTIN.
=========================================================
The Information Security Office at the University of Texas at Austin
has found the following web page to be vulnerable to a high-risk application attack:
HOST: 129.74.85.59 [ps-crc-mesh-1.crc.nd.edu]
DATE: 2017-07-10 18:22:58 CST/CDT
GET: http://ps-crc-mesh-1.crc.nd.edu/maddash-webui/details.cgi?uri=%3C/script%3E%3Cscript%3Ealert(150)%3C/script%3E
ATTACK DETAILS:
This page is vulnerable to Cross-site scripting attacks.
Cross-site scripting attacks, in general, are an issue because
they are enabling attacks. Specially-crafted malicious URLs can
steal authentication tokens/cookies when a logged-in user visits them,
giving the attacker full access to that user's account in the application.
Reflected XSS attacks, in particular, are a concern as they can be used to
socially engineer a user into clicking on what appears to be a legitimate URL.
Please also consider the following:
- Web application security testing should be performed regularly,
especially for any public web applications. This includes
tracking application inventory, general code review and vulnerability
assessments using web application security testing tools.
- All input received by the web server should be checked before
it is processed. The best method is to remove all unwanted input and
accept only expected input. For example, ensure angle brackets are
not allowed in any input to any Web page fields. Additionally, no
syntactic input should be allowed. Syntactic input can come from
databases, other servers, etc. All input into a Web application must
be filtered to ensure the delivery of clean content to individuals using
your service.
- Other References:
OWASP Guide to Building Secure Web Applications and Web Services
https://www.owasp.org/index.php/Category:OWASP_Guide_Project
UT-Austin: Minimum Security Standards for Application Development and Administration
https://security.utexas.edu/policies/standards_application
Please let us know if you believe any of this information to be inaccurate
so that we can be of better service in the future.
We hope this information is helpful.
Information Security Office
The University of Texas at Austin
| 512.475.9242
http://security.utexas.edu
=======================================
https://www.facebook.com/utaustiniso
https://twitter.com/UT_ISO
=======================================
--
You received this message because you are subscribed to the Google Groups "Infosec" group.
To unsubscribe from this group and stop receiving emails from it, send an email to .
To post to this group, send email to .
To view this discussion on the web visit https://groups.google.com/a/nd.edu/d/msgid/infosec-group/201707110100.v6B10Da0012243%40relay.infosec.utexas.edu .
From: UT Information Security Office <>
Date: Mon, Jul 10, 2017 at 9:00 PM
Subject: [ISOTicket:1684893] UT/ISO -- Verified Vulnerable Web Page [129.74.85.59 - ND.EDU]
To:
==============================
THE FOLLOWING ALERT IS THE PRODUCT OF A VULNERABILITY
DETECTION SERVICE SPONSORED BY U.T. AUSTIN.
==============================
The Information Security Office at the University of Texas at Austin
has found the following web page to be vulnerable to a high-risk application attack:
HOST: 129.74.85.59 [ps-crc-mesh-1.crc.nd.edu]
DATE: 2017-07-10 18:22:58 CST/CDT
GET: http://ps-crc-mesh-1.crc.nd.ed
ATTACK DETAILS:
This page is vulnerable to Cross-site scripting attacks.
Cross-site scripting attacks, in general, are an issue because
they are enabling attacks. Specially-crafted malicious URLs can
steal authentication tokens/cookies when a logged-in user visits them,
giving the attacker full access to that user's account in the application.
Reflected XSS attacks, in particular, are a concern as they can be used to
socially engineer a user into clicking on what appears to be a legitimate URL.
Please also consider the following:
- Web application security testing should be performed regularly,
especially for any public web applications. This includes
tracking application inventory, general code review and vulnerability
assessments using web application security testing tools.
- All input received by the web server should be checked before
it is processed. The best method is to remove all unwanted input and
accept only expected input. For example, ensure angle brackets are
not allowed in any input to any Web page fields. Additionally, no
syntactic input should be allowed. Syntactic input can come from
databases, other servers, etc. All input into a Web application must
be filtered to ensure the delivery of clean content to individuals using
your service.
- Other References:
OWASP Guide to Building Secure Web Applications and Web Services
https://www.owasp.org/index.ph
UT-Austin: Minimum Security Standards for Application Development and Administration
https://security.utexas.edu/po
Please let us know if you believe any of this information to be inaccurate
so that we can be of better service in the future.
We hope this information is helpful.
Information Security Office
The University of Texas at Austin
| 512.475.9242
http://security.utexas.edu
==============================
https://www.facebook.com/utaus
https://twitter.com/UT_ISO
==============================
--
You received this message because you are subscribed to the Google Groups "Infosec" group.
To unsubscribe from this group and stop receiving emails from it, send an email to .
To post to this group, send email to .
To view this discussion on the web visit https://groups.google.com/a/nd
- [perfsonar-user] Fwd: [ISOTicket:1684893] UT/ISO -- Verified Vulnerable Web Page [129.74.85.59 - ND.EDU], Matt Vander Werf, 07/11/2017
Archive powered by MHonArc 2.6.19.