Latest Stories

Stay up-to-date with everything at Approach

Blog article

Did you scan your security scanners?

Publication date

23.04.2019

A critical XSS flaw in Saint Security Suite let attackers take control—see how it was discovered, why it matters, and how to protect your system now!

Vulnerability in Saint Security Suite – Ethical Hacker Testimonial about security scanners

We’ve recently been commissioned by one of our customers to assess some well-known vulnerability scanners. Although the assessment was supposed to focus on functional aspects, the pentester part of myself couldn’t help to take a look at the technical resilience of the different applications. So, after some hours, I began making some basic injection tests.

To my great surprise it only took some minutes to discover a cross-site-scripting (XSS) vulnerability in Saint Security Suite, one of the most reputable scanners. Using the XSS, an attacker can induce a user to unwittingly perform actions within the application, so I created a simple proof of concept to demonstrate how it could be used to silently create an Administrator and take over the entire application. 

Watch the video below

https://www.youtube.com/watch?v=PqDxHfK4aqY

Affected versions: SAINT 9.2 through 9.5.14
SAINT official advisory

Security scanners are developed like any other software, so they could turn out to be vulnerable. Besides, they also contain crucial information, like network devices credentials, assets, and security maps of the network. That’s why these applications should be isolated as much as possible from non-operational networks and protected by a Web Application Firewall.  

The vulnerability was disclosed to Carson & SAINT on April 9 and the proof of concept was provided. The Saint development team then reacted very quickly and released the fix on April 19. In conclusion, we recommend you to update your installation.

This article has been written by David Bloom, Cyber Security Senior Consultant.

Want to stay up to date with the latest threats? Subscribe to our SOC newsletter.

OTHER STORIES

Discover how AI-powered website generation enhances red teaming tactics, concealing C2 infrastructure with realistic, dynamic sites that evade detection.
Explore how Exegol revolutionises penetration testing with Docker-based environments, offering customisation, reproducibility, and seamless security workflows.
A tiny Raspberry Pi can outsmart NAC security, slip past defences, and exploit IEEE 802.1X vulnerabilities—see how these risks impact your network!

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?