The SpiderLabs team at Trustwave published a new advisory today, which details four vulnerabilities in Scrutinizer NetFlow & sFlow Analyzer by Plixer International. Scrutinizer NetFlow & sFlow Analyzer is a product used for network analysis to monitor the overall health of a network and reports statistics, such as which hosts, applications and protocols are consuming network bandwidth. These findings include a http authentication bypass vulnerability, arbitrary file upload vulnerability, multiple cross-site scripting vulnerabilities, and undocumented default MySQL user accounts.
Additionally, Jonathan Claudius of Trustwave SpiderLabs discovered security issues with the software having undocumented default MySQL user accounts, and parameters that need to be sanitized for XSS. Plixer International confirmed these findings as well as fixes these issues in version 9.5.0. More information on this advisory can be found here:
As an added note, Trustwave SpiderLabs has deployed protections for these findings in TrustKeeper scanning solution. Trustwave customers using the TrustKeeper Scan Engine will “auto-magically” receive this update.