First published: Fri Aug 25 2023(Updated: )
An issue was discovered in Stormshield SNS 3.8.0. Authenticated Stored XSS in the admin login panel leads to SSL VPN credential theft. A malicious disclaimer file can be uploaded from the admin panel. The resulting file is rendered on the authentication interface of the admin panel. It is possible to inject malicious HTML content in order to execute JavaScript inside a victim's browser. This results in a stored XSS on the authentication interface of the admin panel. Moreover, an unsecured authentication form is present on the authentication interface of the SSL VPN captive portal. Users are allowed to save their credentials inside the browser. If an administrator saves his credentials through this unsecured form, these credentials could be stolen via the stored XSS on the admin panel without user interaction. Another possible exploitation would be modification of the authentication form of the admin panel into a malicious form.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Stormshield Stormshield Network Security | >=3.6.0<3.7.13 | |
Stormshield Stormshield Network Security | >=3.8.0<3.11.0 | |
Stormshield Stormshield Network Security | >=4.0.0<4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-11711.
The severity of CVE-2020-11711 is medium with a severity value of 4.8.
The affected software is Stormshield SNS versions 3.6.0 to 3.7.13, 3.8.0 to 3.11.0, and 4.0.0 to 4.1.1.
CVE-2020-11711 allows authenticated stored XSS in the admin login panel, leading to SSL VPN credential theft.
Yes, you can find more information at the following links: [Advisory](https://advisories.stormshield.eu/2020-011/), [Twitter](https://twitter.com/_ACKNAK_), [Digitemis Blog](https://www.digitemis.com/category/blog/actualite/)