NetArt Media Car Portal Arbitrary File Upload and HTML Injection Vulnerabilities
BID:53267
Info
NetArt Media Car Portal Arbitrary File Upload and HTML Injection Vulnerabilities
| Bugtraq ID: | 53267 |
| Class: | Input Validation Error |
| CVE: |
CVE-2012-6509 CVE-2012-6510 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 26 2012 12:00AM |
| Updated: | Mar 19 2015 08:21AM |
| Credit: | the_storm |
| Vulnerable: |
NetArt Media Car Portal 3.0 |
| Not Vulnerable: | |
Discussion
NetArt Media Car Portal Arbitrary File Upload and HTML Injection Vulnerabilities
NetArt Media Car Portal is prone to an arbitrary-file-upload vulnerability and multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker could exploit these vulnerabilities to execute arbitrary script code in a user's browser in the context of the affected site or execute arbitrary code on the server.
NetArt Media Car Portal 3.0 is vulnerable; other versions may also be affected.
NetArt Media Car Portal is prone to an arbitrary-file-upload vulnerability and multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker could exploit these vulnerabilities to execute arbitrary script code in a user's browser in the context of the affected site or execute arbitrary code on the server.
NetArt Media Car Portal 3.0 is vulnerable; other versions may also be affected.
Exploit / POC
NetArt Media Car Portal Arbitrary File Upload and HTML Injection Vulnerabilities
An attacker can exploit these issues via a browser.
An attacker can exploit these issues via a browser.
Solution / Fix
NetArt Media Car Portal Arbitrary File Upload and HTML Injection Vulnerabilities
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].