ID

VAR-201002-0132


CVE

CVE-2010-0470


TITLE

Comtrend CT-507IT ADSL Router scvrtsrv.cmd Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2010-003817

DESCRIPTION

Cross-site scripting (XSS) vulnerability in scvrtsrv.cmd in Comtrend CT-507IT ADSL Router allows remote attackers to inject arbitrary web script or HTML via the srvName parameter. Kangquan Telecom's CT-5071T is a high-performance ADSL2+ Ethernet router. The CT-5071T router does not properly filter the srvName parameter submitted to scvrtsrv.cmd and returns it to the user. Script code. Comtrend CT-507 IT is prone to a cross-site scripting vulnerability because the device's web interface fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. ---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: Comtrend CT-507IT "srvName" Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA38309 VERIFY ADVISORY: http://secunia.com/advisories/38309/ DESCRIPTION: A vulnerability has been reported in Comtrend CT-507IT, which can be exploited by malicious people to conduct cross-site scripting attacks. SOLUTION: Do not browse untrusted websites. Do not follow untrusted links. PROVIDED AND/OR DISCOVERED BY: Yoyahack ORIGINAL ADVISORY: http://packetstormsecurity.org/1001-exploits/comtrend-xss.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2010-0470 // JVNDB: JVNDB-2010-003817 // CNVD: CNVD-2010-0178 // BID: 38004 // VULHUB: VHN-43075 // PACKETSTORM: 85722

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-0178

AFFECTED PRODUCTS

vendor:comtrendmodel:ct-507it adsl routerscope: - version: -

Trust: 1.4

vendor:comtrendmodel:ct-507it adsl routerscope:eqversion:*

Trust: 1.0

vendor:comtrendmodel:ct-5071tscope: - version: -

Trust: 0.6

vendor:comtrendmodel:ct-507 itscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2010-0178 // BID: 38004 // JVNDB: JVNDB-2010-003817 // CNNVD: CNNVD-201002-010 // NVD: CVE-2010-0470

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0470
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-0470
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201002-010
value: MEDIUM

Trust: 0.6

VULHUB: VHN-43075
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-0470
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-43075
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-43075 // JVNDB: JVNDB-2010-003817 // CNNVD: CNNVD-201002-010 // NVD: CVE-2010-0470

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-43075 // JVNDB: JVNDB-2010-003817 // NVD: CVE-2010-0470

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201002-010

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 85722 // CNNVD: CNNVD-201002-010

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-003817

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-43075

PATCH

title:Top Pageurl:http://www.comtrend.com/

Trust: 0.8

sources: JVNDB: JVNDB-2010-003817

EXTERNAL IDS

db:NVDid:CVE-2010-0470

Trust: 3.4

db:SECUNIAid:38309

Trust: 2.4

db:BIDid:38004

Trust: 2.0

db:JVNDBid:JVNDB-2010-003817

Trust: 0.8

db:CNNVDid:CNNVD-201002-010

Trust: 0.7

db:CNVDid:CNVD-2010-0178

Trust: 0.6

db:NSFOCUSid:14430

Trust: 0.6

db:SEEBUGid:SSVID-86787

Trust: 0.1

db:EXPLOIT-DBid:33580

Trust: 0.1

db:VULHUBid:VHN-43075

Trust: 0.1

db:PACKETSTORMid:85722

Trust: 0.1

sources: CNVD: CNVD-2010-0178 // VULHUB: VHN-43075 // BID: 38004 // JVNDB: JVNDB-2010-003817 // PACKETSTORM: 85722 // CNNVD: CNNVD-201002-010 // NVD: CVE-2010-0470

REFERENCES

url:http://packetstormsecurity.org/1001-exploits/comtrend-xss.txt

Trust: 1.8

url:http://www.securityfocus.com/bid/38004

Trust: 1.7

url:http://secunia.com/advisories/38309

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0470

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0470

Trust: 0.8

url:http://secunia.com/advisories/38309/

Trust: 0.7

url:http://www.nsfocus.net/vulndb/14430

Trust: 0.6

url:http://www.comtrend.com/

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/blog/71/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2010-0178 // VULHUB: VHN-43075 // BID: 38004 // JVNDB: JVNDB-2010-003817 // PACKETSTORM: 85722 // CNNVD: CNNVD-201002-010 // NVD: CVE-2010-0470

CREDITS

Yoyahack

Trust: 0.9

sources: BID: 38004 // CNNVD: CNNVD-201002-010

SOURCES

db:CNVDid:CNVD-2010-0178
db:VULHUBid:VHN-43075
db:BIDid:38004
db:JVNDBid:JVNDB-2010-003817
db:PACKETSTORMid:85722
db:CNNVDid:CNNVD-201002-010
db:NVDid:CVE-2010-0470

LAST UPDATE DATE

2025-04-11T23:15:43.387000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-0178date:2010-02-01T00:00:00
db:VULHUBid:VHN-43075date:2010-02-03T00:00:00
db:BIDid:38004date:2015-04-13T21:02:00
db:JVNDBid:JVNDB-2010-003817date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-201002-010date:2010-02-03T00:00:00
db:NVDid:CVE-2010-0470date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-0178date:2010-02-01T00:00:00
db:VULHUBid:VHN-43075date:2010-02-02T00:00:00
db:BIDid:38004date:2010-01-29T00:00:00
db:JVNDBid:JVNDB-2010-003817date:2012-06-26T00:00:00
db:PACKETSTORMid:85722date:2010-01-29T13:55:51
db:CNNVDid:CNNVD-201002-010date:2010-01-29T00:00:00
db:NVDid:CVE-2010-0470date:2010-02-02T17:30:00.517