dotnetnuke 5.06.00 XSS

2010.12.16
Credit: ProCheckUp
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

PR10-19 DotNetNuke CMS XSS * Advisory publicly released: Friday, 3 December 2010 * Vulnerability found: Saturday, 30 October 2010 * Vendor informed: Monday, 1 November 2010 * Severity level: Low/Medium * Credits Richard Brain of ProCheckUp Ltd (www.procheckup.com) * Description DotNetNuke is a Content Management System (CMS) that is based on the .Net framework. Procheckup has discovered that a DotNetNuke programs is vulnerable to a generic reflective Cross Site Scripting (XSS) attack. Note: DotNetNuke was tested on a fully patched Windows 2003 R2 SP2 and IIS 6, and SQL 2005 were used as the application server and the backend database. DotNetNuke Versions tested 5.05.01 patched till the 30 October 201 * Proof of concept The following demonstrate the XSS flaw:- Install page XSS (note the system tested the install process had been completed). http://target-domain.foo/Install/InstallWizard.aspx?__VIEWSTATE=<script>alert(1)</script> Consequences: An attacker may be able to cause execution of malicious scripting code in the browser of a user who clicks on a link to a exposed Mura site. Such code would run within the security context of the target domain. This type of attack can result in non-persistent defacement of the target site, or the redirection of confidential information (i.e.: session IDs) to unauthorised third parties. * How to fix As of the 3 December no patch has been released. * References

References:

http://www.securitytracker.com/id?1024828
http://www.securityfocus.com/bid/45180
http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr10-19
http://secunia.com/advisories/42478
http://packetstormsecurity.org/files/view/96378/PR10-19.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top