ZYWALL Referer Header XSS Vulnerability

2008.05.14
Credit: Deniz Cevik
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

Affected Software/Device: Zyxel ZYWall 100 Vulnerability: Cross Site Scripting Risk: Low Description: The ZyWALL 100 is designed to act as a secure gateway via xDSL/Cable modems or broadband routers for small to medium size companies. The ZyWALL 100 features an ICSA certified firewall, IPSec VPN capability, MultiNAT, web pages content filtering and an embedded web configurator for easy configuration and management. ZyWALL web based management interface utilizes referer header for serving 404 Error pages. The vulnerability can be exploited by requesting a non-existing web page with a specially crafted referer header. As the application does not properly sanitize the data contained in the referer header, desired script code can be run on client browser. Sample Request: GET /blah.htm HTTP/1.1 Host: www.site.com Referer: blaaaa"><script>alert(12345)</script>aaaah.htm Deniz CEVIK www.intellectpro.com.tr


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top