D-Link DSL-G624T Var:RelaodHref Cross-Site Scripting Vulnerability
BID:23802
Info
D-Link DSL-G624T Var:RelaodHref Cross-Site Scripting Vulnerability
| Bugtraq ID: | 23802 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | May 03 2007 12:00AM |
| Updated: | May 04 2007 10:39PM |
| Credit: | Tim Brown is credited with the discovery of this vulnerability. |
| Vulnerable: |
D-Link DSL-G624T 0 |
| Not Vulnerable: | |
Discussion
D-Link DSL-G624T Var:RelaodHref Cross-Site Scripting Vulnerability
D-Link DSL-G624T is prone to a cross-site scripting vulnerability. This issue is due to a failure to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
D-Link DSL-G624T is prone to a cross-site scripting vulnerability. This issue is due to a failure to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Exploit / POC
D-Link DSL-G624T Var:RelaodHref Cross-Site Scripting Vulnerability
An attacker can exploit this issue by enticing an unsuspecting user to follow a malicious URI.
The following proof-of-concept URI is available.
http://www.example.com/cgi-bin/webcm?getpage=../html/home/home_RelaodHref.htm&var:RelaodHref=a"%20==%20"a"){alert("XSS")}}</script>
An attacker can exploit this issue by enticing an unsuspecting user to follow a malicious URI.
The following proof-of-concept URI is available.
http://www.example.com/cgi-bin/webcm?getpage=../html/home/home_RelaodHref.htm&var:RelaodHref=a"%20==%20"a"){alert("XSS")}}</script>
Solution / Fix
D-Link DSL-G624T Var:RelaodHref Cross-Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: mailto:[email protected]
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: mailto:[email protected]
References
D-Link DSL-G624T Var:RelaodHref Cross-Site Scripting Vulnerability
References:
References: