XSS Bugs in Canon’s Vitrea View
“Canon Medical released a patch for these issues in version 7.7.6. We recommend all customers on version 7. x to update to the latest release. We always appreciate vendors like Canon Medical that approach the disclosure process with transparency and in the interest of the security of their products and users.”
A threat actor can activate the bugs to access/change patient details (i.e. stored scans and images) and get extra access to some features related to Vitrea View.
The first problem is an unauthorized Reflected XSS that exists in an error message at /vitrea-view/error/, reflecting all input following the /error/ subdirectory back to the user, with minor limitations.
How does the bug work?
The researchers observed that space characters and single and double quotes can alter the reflection. The use of base 64 encoding and backticks (`) can allow to escape these restrictions, as well as importing remote scripts.
The second problem is one more Reflected XSS within the Vitrea View Administrative panel. A threat actor can access the pane
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: