XSS and Html Code Injection in Micronet SP1910 data access controller UI

2009.12.11
Credit: K053
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

# Exploit: XSS & Html code injection in Micronet SP1910 data access controller UI # Date: 27-11-2009 # Author: K053 # Vendor: http://www.micronet.info/model_detail.aspx?series_no=6&sno=472 # Tested on : Private Networks ------------------------------------------------------------------------------------ Note : Micronet introduces an exciting new product?SP1910 Network Access Controller. It is specially designed for secure wired and wireless network environments of small or medium companies. Micronet UI is vulnerable to xss attack . Attacker able to steal users credential and disconnect them . -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=- POC : you can spot xss any page , http://server/loginpages/error_user.shtml?uname=userid&msg=<script>alert('xss')</script>

References:

http://secunia.com/advisories/37514
http://packetstormsecurity.org/0911-exploits/micronet-xss.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top