SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   D-Link Router Vendors:   D-Link Systems, Inc.
D-Link DSA-3100 Router Input Validation Hole in 'login_error.shtml' Permits Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1016173
SecurityTracker URL:  http://securitytracker.com/id/1016173
CVE Reference:   CVE-2006-2653   (Links to External Site)
Updated:  Aug 25 2009
Original Entry Date:  May 29 2006
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Exploit Included:  Yes  

Description:   A vulnerability was reported in the D-Link DSA-3100 Router. A remote user can conduct cross-site scripting attacks.

The 'login_error.shtml' script does not properly filter HTML code from user-supplied input in the 'uname' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the D-Link Router interface and will run in the security context of that device. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the device, access data recently submitted by the target user via web form to the device, or take actions on the device acting as the target user.

A demonstration exploit URL is provided:

http://[target]/login_error.shtml?uname=%3CBODY%20ONLOAD=alert%28%27www.eazel.es%27%29%3E

The original advisory is available at:

http://www.eazel.es/media/advisory003-D-Link-DSA-3100-Cross-Site-Scripting.html

jaime.blasco(at)eazel(dot).es discovered this vulnerability.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the D-Link Router, access data recently submitted by the target user via web form to the device, or take actions on the device acting as the target user.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.dlink.com/ (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC