Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R4] SecurityCenter 5.3.1 Fixes Multiple Vulnerabilities

Medium

Synopsis

SecurityCenter 5.2.0 was found vulnerable to three cross-site scripting issues. If exploited, a victim could be tricked into executing attacker-controlled JavaScript that runs in the their own context, potentially leading to authentication credential disclosure or other attacks. A fourth issue, an authenticated path disclosure weakness, has also been addressed.

  • CVE-2016-82008 - Reflected XSS. An unauthenticated attacker could craft a URL that can be used against an authenticated SecurityCenter user. (NN Group N.V.)
  • CVE-2016-82009 - Stored XSS. An authenticated attacker with user privileges could embed malicious JavaScript that would be stored by SecurityCenter, and subsequently rendered by other users loading a specific page. (NN Group N.V.)
  • CVE-2016-82010 - Reflected XSS. An unauthenticated attacker could craft a URL that can be used against an authenticated SecurityCenter user. (NN Group N.V.)
  • CVE-2016-82011 - System path disclosure weakness (post-auth). (NN Group N.V.)

In addition to these fixes, SecurityCenter now implements a variety of HTTP headers and Cookie flags to further enhance security. Thanks to both CESG and NN Group N.V. for pointing out methods for accomplishing this. Note that the CVSSv2 score associated with this advisory reflects the most severe issue by the scoring standards, which is the reflected XSS.

Please note that Tenable strongly recommends that SecurityCenter be installed on a subnet that is not Internet addressable.

Solution

Tenable has released version 5.3.1 of SecurityCenter which addresses these issues, as well as introduces a wide variety of new features and security enhancements. Upgrade information can be obtained from:

http://static.tenable.com/prod_docs/upgrade_security_center.html

Despite being April first, this is not a joke! Users are strongly encouraged to upgrade as soon as possible.

This page contains information regarding security vulnerabilities that may impact Tenable's products. This may include issues specific to our software, or due to the use of third-party libraries within our software. Tenable strongly encourages users to ensure that they upgrade or apply relevant patches in a timely manner.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID: TNS-2016-07
Risk Factor: Medium
Credit:
<a href="https://www.nn-group.com/" target="_blank">NN Group N.V.</a>
<a href="https://www.cesg.gov.uk/" target="_blank">CESG</a>
CVSSv2 Base / Temporal Score
4.3 / 3.4
CVSSv2 Vector:
(AV:N/AC:M/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C)
Additional Keywords:
CWE-79

Affected Products

SecurityCenter 5.2.0

Disclosure Timeline

2016-03-03 - Researcher sends XSS details to Support
2016-03-03 - Tenable acknowledges receipt
2016-03-06 - Fix developed internally, slated for 5.3 release
2016-03-08 - Researcher mentions additional findings
2016-03-18 - Researcher gets permission to share detailed report with Tenable
2016-03-28 - Tenable releases SecurityCenter 5.3.0 fixing two issues
2016-04-01 - Tenable releases SecurityCenter 5.3.1 fixing two more issues

Advisory Timeline

2016-04-01 - [R1] Initial Release
2016-11-12 - [R2] Adjust CVSSv2 score
2017-02-08 - [R3] Standardized title
2017-02-28 - [R4] Adjust CVSS for worst-case scenario (AV:A -> AV:N)