LevelOne WBR3404TX Broadband Router RC Parameter Cross Site Scripting Vulnerabilities
BID:25738
Info
LevelOne WBR3404TX Broadband Router RC Parameter Cross Site Scripting Vulnerabilities
| Bugtraq ID: | 25738 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-5027 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 19 2007 12:00AM |
| Updated: | May 07 2015 05:35PM |
| Credit: | [email protected] is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
Level One WBR3404TX R1.94p0vTIG |
| Not Vulnerable: | |
Discussion
LevelOne WBR3404TX Broadband Router RC Parameter Cross Site Scripting Vulnerabilities
The LevelOne WBR3404TX Broadband Router is prone to multiple cross-site scripting vulnerabilities because the software fails to sufficiently sanitize user-supplied input. These issues occurs in the web management panel.
Exploiting these vulnerabilities may allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected site. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks.
LevelOne WBR3404TX firmware version R1.94p0vTIG is vulnerable; other versions may also be affected.
The LevelOne WBR3404TX Broadband Router is prone to multiple cross-site scripting vulnerabilities because the software fails to sufficiently sanitize user-supplied input. These issues occurs in the web management panel.
Exploiting these vulnerabilities may allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected site. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks.
LevelOne WBR3404TX firmware version R1.94p0vTIG is vulnerable; other versions may also be affected.
Exploit / POC
LevelOne WBR3404TX Broadband Router RC Parameter Cross Site Scripting Vulnerabilities
To exploit these issues, an attacker must entice an unsuspecting victim into following a malicious URI.
The following proof-of-concept URIs are available:
http://www.example.com/cgi-bin/ddns?RC=%40&DG0=x&DP=D&DD=[xss]
http://www.example.com/cgi-bin/ddns?RC=%40&DG0=x&DP=D&DD=&DU=[xss]
To exploit these issues, an attacker must entice an unsuspecting victim into following a malicious URI.
The following proof-of-concept URIs are available:
http://www.example.com/cgi-bin/ddns?RC=%40&DG0=x&DP=D&DD=[xss]
http://www.example.com/cgi-bin/ddns?RC=%40&DG0=x&DP=D&DD=&DU=[xss]
Solution / Fix
LevelOne WBR3404TX Broadband Router RC Parameter Cross Site Scripting Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
LevelOne WBR3404TX Broadband Router RC Parameter Cross Site Scripting Vulnerabilities
References:
References: