← Advisories

Sipwise C5 NGCP CSC Multiple Stored/Reflected XSS Vulnerabilities

Medium
Advisory ID
ZSL-2021-5648
Release Date
23 April 2021
Vendor
Affected Version
<=CE_mr9.3.1, NGCP www_admin version 3.6.7
Tested On
Apache/2.2.22 (Debian), Apache/2.2.16 (Debian), nginx
Summary

Sipwise C5 (also known as NGCP - the Next Generation Communication Platform) is a SIP-based Open Source Class 5 VoIP soft-switch platform that allows you to provide rich telephony services. It offers a wide range of features (e.g. call forwarding, voicemail, conferencing etc.) that can be configured by end users in the self-care web interface. For operators, it offers a web-based administrative panel that allows them to configure subscribers, SIP peerings, billing profiles, and other entities. The administrative web panel also shows the real-time statistics for the whole system. For tight integration into existing infrastructures, Sipwise C5 provides a powerful REST API interface.

Description

Sipwise software platform suffers from multiple authenticated stored and reflected cross-site scripting vulnerabilities when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Proof of Concept
Disclosure Timeline
13.04.2021Vulnerability discovered.
19.04.2021Contact with the vendor.
22.04.2021No response from the vendor.
23.04.2021Public security advisory released.
26.04.2021Vendor responds with clarification of vulnerable versions and working on fixes.
26.04.2021NGCP www_admin version 3.6.7 has not been in use since mr3.0, 7+ years ago, and that component has been completely abandoned around 4 years ago: https://github.com/sipwise/www_admin/
26.04.2021The 'addressbook' is distinct from the 'phonebook' and was available only on www_csc, which has not been used for 7 years now.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
23.04.2021Initial release
25.04.2021Added reference [5], [6] and [7]
06.05.2021Added vendor status