ID

VAR-E-201409-0270


TITLE

Airties Air6372SO Modem Web Interface 'top.html' Cross Site Scripting Vulnerability

Trust: 0.3

sources: BID: 69762

DESCRIPTION

Airties Air6372SO modem web interface is prone to a cross-site-scripting vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Trust: 0.3

sources: BID: 69762

AFFECTED PRODUCTS

vendor:airtiesmodel:air6372soscope:eqversion:0

Trust: 0.3

sources: BID: 69762

EXPLOIT

To exploit this issue an attacker must entice an unsuspecting victim to follow a malicious URI.
The following example URI is available:
http://www.example.com/top.html?productboardtype=<b>H4x0reSec</b> <script>alert(document.cookie)</script>

Trust: 0.3

sources: BID: 69762

PRICE

Free

Trust: 0.3

sources: BID: 69762

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 69762

CREDITS

KnocKout

Trust: 0.3

sources: BID: 69762

EXTERNAL IDS

db:BIDid:69762

Trust: 0.3

sources: BID: 69762

REFERENCES

url:http://www.airties.com/

Trust: 0.3

sources: BID: 69762

SOURCES

db:BIDid:69762

LAST UPDATE DATE

2022-07-27T09:21:50.814000+00:00


SOURCES UPDATE DATE

db:BIDid:69762date:2014-09-09T00:00:00

SOURCES RELEASE DATE

db:BIDid:69762date:2014-09-09T00:00:00