sMax. Security Advisory ------------------------------- Title: Cross-Site Scripting in CiscoSecure ACS v3.0 Date: June 14, 2002 PRODUCT AFFECTED: CiscoSecure ACS v3.0 (Win32) PRODUCT OVERVIEW: CiscoSecure ACS is Cisco's implementation of RADIUS. v3.0 is the current release of the product. Taken from their website: "Cisco Secure ACS provides authentication, authorization, and accounting (AAA—pronounced "triple A") services to network devices that function as AAA clients, such as a network access server, PIX Firewall, or router." VULNERABILITY: Testing CiscoSecure ACS v3.0(1), Build 40 reveals a cross-site scripting problem in the web server component. Specifically, the "action" argument that the setup.exe handler uses does not appear to do proper input validation. Other arguments were not tested, though they may be vulnerable as well. Proof-of-concept: http://IP.ADD.RE.SS:dyn_port/setup.exe?action=