DotNetNuke ErrorPage.aspx Cross-Site Scripting Vulnerability

Credit: Ben Hawkes
Risk: Low
Local: No
Remote: Yes

--- Lateral Security Advisory 20090430-001 --- Name: DotNetNuke ErrorPage.aspx Cross-Site Scripting Vulnerability Reported: 30th April 2009 Published: 22nd May 2009 Background: DotNetNuke is one of the most widely adopted open source framework for website content management and web application development on Microsoft ASP.NET. Vulnerability Description: DotNetNuke is prone to a cross-site scripting vulnerability because the application fails to properly sanitise user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. Exploit: The issue occurs due to DotNetNuke not correctly sanitising iframes closed with an open-bracket. The following URL contains an example exploit: http://<site>/ErrorPage.aspx?status=500&error=test%3Ciframe%20src=%22 Impacted Products: The issue affects versions up to and including DotNetNuke 4.9.3. Solution: Upgrade to DotNetNuke version 4.9.4 or above. DotNetNuke's bulletin regarding this issue can be found here: Researcher: Ben Hawkes, Lateral Security


Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018,


Back to Top