Reference13r2:Release Notes Security

From innovaphone wiki
Jump to navigation Jump to search
There are also other versions of this article available: Reference13r1 | Reference13r2 (this version) | Reference13r3 | Reference14r1 | Reference14r2

This is the Security 13r2 Release Notes Document. It is an extract of the 13r2 Release Notes showing only the security fixes made (this mechanism was introduced with 13r2SR12). It can be used by security sensitive customers to decide whether an update of the innovaphone structure is needed with a new Service Release.

Service Releases are planned for the second Monday each month.

Please see the disclaimer before using the information presented here!

Security 13r2

13r2 Service Release 12 (136349)

124576 - Protection against theoretical XSS possibility in pbx_appclient_popup.htm

URLs given in the "url" parameter are now filtered for javascript code.

13r2 Service Release 13 (136357)

124821 - Potential restart on some special login requests to Advanced UI

Maybe caused by an attack

124652 - TLS: Possibility to disable client-initiated renegotiation

Renegotation can now be disabled in the TLS settings.

  • Applies to TLS 1.0, TLS 1.1 and TLS 1.2 in the firmware. TLS 1.3 does not support renegotiation.
  • Renegotiation could be used by attackers to cause additional CPU load on servers.

Advanced UI:

  • New flag IPx / TLS / Disable renegotiation

Config lines:

  • config change TLS0 /no-renegotiation
  • config change TLS6 /no-renegotiation

13r2 Service Release 14 (136373)

127224 - App Events: Do not broadcast syslog messages on not authenticated WebSocket connections

Syslog messages delivered to the Events instance were sent over WebSocket connections that were not authenticated via AppLogin. Reported by trizwo GmbH IT & Communication,

For more details: <a href="" target="_blank"></a>

13r2 Service Release 17 (136386)

131497 - Advanced UI: Prevent XSL injection

The servlets for the advanced UI accept an "xsl" URL paramter that specifies the XSLT file for displaying the corresponding page.

Before this fix it was possible to specify a DATA URL containing a malicious style sheet that could be used for phishing attacks.

After this fix no values containing a colon are allowed, like:

  • xsl=data:...
  • xsl=data%3A...
  • xsl=data%3a...
  • xsl=javascript%3A...
  • xsl=http%3A...
  • ...

So only the pre-defined style sheets from the box are allowed.

Reported by trizwo GmbH IT & Communication,

132044 - Fixed command injection vulnerability by modification of service id during app upload


Just possible with access to the AP Manager and knowledge of the password of the AP Manager.

The service ID is now validated and must only contain a-zA-Z0-9_- chars.
Thus no command injection vulnerability is possible anymore.

Reported by: Dennis Herrmann of Code White GmbH

Note: the CVE score is wrong (at 7.10.2022), as the CVE has been reported with wrong "Privileges Required" and "User Interaction" tags. Privileges Required must be "High" instead of "None" and User Interaction "Required" instead of "None".

With correct tags, the score would be much lower!

13r2 Service Release 21 (136409)

139670 - Addtional protection against theoretical XSS possibility in pbx_appclient_popup.htm

  • The page does not work anymore, if loaded without a window.opener.
  • The page does not work anymore, if loaded in a standard browser, just in the myApps launcher.
  • The URL-Parameter does not allow data-URLs anymore.

13r2 Service Release 22 (136416)

142560 - App Devices: do not allow to provision a device to a different domain if already provisioned

It is not longer possible to provision a device into another domain if the device is already inside a domain in devices.

If you want to reprovision a device to a different domain, you must first remove it from its current domain.

13r2 Service Release 23 (136420)

144019 - myApps Windows: improved signature validation in update service

13r2: End of life