PT-2011-07: Cross-Site Scripting in Cisco Small Business Devices
Cisco SPA8000 8-port IP Telephony Gateway 6.1.10 and earlier
Cisco SPA8800 IP Telephony Gateway 6.1.7 and earlier
Cisco SPA2102 Phone Adapter with Router 5.2.12 and earlier
Cisco SPA3102 Voice Gateway with Router 5.1.10 and earlier
Cisco Small Business SPA500 Series IP Phones 7.4.8a and earlier
Severity level: Medium
Impact: Cross-Site Scripting
Access Vector: Remote
Base Score: 4.3
Cisco Small Business IP Telephony devices are intended for high-volume deployments by VoIP service providers to residential and small business customers.
The specialists of the Positive Research center have detected "Cross-Site Scripting" vulnerability in Cisco Small Business Devices.
User input passed to "Display name" and "User ID" parameters of SIP INVITE request "FROM" field is not properly sanitized. This can be exploited to inject malicious code and allows to execute arbitrary HTML and script code in user/admin browser session in context of IP phone's web management console (Call Log).
How to fix
Cisco customers with active contracts can obtain updates through the Software Center at the following link: Cisco.
Cisco customers without contracts can obtain upgrades by contacting the Cisco Technical Assistance Center via e-mail at email@example.com.
23.06.2011 - Vendor is notified
24.06.2011 - Vendor gets vulnerability details
12.06.2012 - Vendor releases fixed version and details
27.09.2012 - Public disclosure
The vulnerability has discovered by Alexander Zaitsev, Gleb Gritsai, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research: