Vendor: Sophos
Product: Sophos iView (The EOL was December 31st 2020)
Product description:
Reflected XSS in the privileged user area, where i was able to set parameter ‘json->”grpname”’s value to ‘ww;</script>/</script/>/<svg/onload=alert(‘Sophos’) width=100//>’
That successfully embedded a script in the response, which was executed when the page loads in the user’s browser.
- CVE ID: CVE-2023-33335
- CWE ID: CWE-79
#Proof of Concept
Reflected cross-site scripting (XSS) vulnerability was discovered in the product.
A cross-site scripting vulnerability was identified.
It was possible to inject malicious code, I’ve successfully embedded a script in the response, which allowed me to execute it when the page loaded in the browser.
The following Proof of Concept (PoC) demonstrates the attack as well as displaying evidence of the script payload being returned in the response.
PoC:
Reply from Sophos via Bugcrowd:
“We are divesting the Sophos iView product, meaning that this particular vulnerability is accepted business risk. I will close this issue as Won’t Fix”
References:
- https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
- https://www.firewalls.com/pub/media/wysiwyg/datasheets/Sophos/iView.pdf
- https://vimeo.com/107872566
- https://docs.sophos.com/nsg/sophos-iview/v03012/Help/en-us/webhelp/onlinehelp/index.html#page/onlinehelp/AccessDevice.html