ID

VAR-201404-0693


TITLE

D-Link DAP-1320 'apply.cgi' has multiple vulnerabilities

Trust: 0.6

sources: CNVD: CNVD-2014-02582

DESCRIPTION

(1) D-Link DAP-1320 apply.cgi failed to properly filter the POST 'html_response_page' parameter, allowing remote attackers to exploit the vulnerability for directory traversal attacks to obtain sensitive file information. (2) Because the program fails to properly filter the 'html_response_page' parameter, it can lead to cross-site scripting attacks, obtaining sensitive information or hijacking user sessions. D-Link DAP-1320 is a wireless network extender from D-Link. D-Link DAP-1320 has a directory traversal vulnerability and a cross-site scripting vulnerability, which are caused by the program's insufficient filtering of user-submitted input. An attacker could use these vulnerabilities to execute arbitrary script code in the context of an affected site and view local files and directories in the context of a Web server process. Steal cookie-based authentication. Vulnerabilities in D-Link DAP-1320 1.20B07 version, other versions may also be affected. Other harvested information may aid in launching further attacks

Trust: 1.35

sources: CNVD: CNVD-2014-02582 // CNNVD: CNNVD-201405-126 // BID: 66973

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-02582

AFFECTED PRODUCTS

vendor:d linkmodel:dap-1320scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2014-02582

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2014-02582
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2014-02582
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2014-02582

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201405-126

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201405-126

EXTERNAL IDS

db:BIDid:66973

Trust: 1.5

db:CNVDid:CNVD-2014-02582

Trust: 0.6

db:CNNVDid:CNNVD-201405-126

Trust: 0.6

sources: CNVD: CNVD-2014-02582 // BID: 66973 // CNNVD: CNNVD-201405-126

REFERENCES

url:http://www.securityfocus.com/archive/1/531863

Trust: 0.6

url:http://www.securityfocus.com/bid/66973

Trust: 0.6

url:http://www.dlink.com/

Trust: 0.3

sources: CNVD: CNVD-2014-02582 // BID: 66973 // CNNVD: CNNVD-201405-126

CREDITS

Kyle Lovett

Trust: 0.9

sources: BID: 66973 // CNNVD: CNNVD-201405-126

SOURCES

db:CNVDid:CNVD-2014-02582
db:BIDid:66973
db:CNNVDid:CNNVD-201405-126

LAST UPDATE DATE

2022-05-17T02:09:49.874000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-02582date:2014-04-23T00:00:00
db:BIDid:66973date:2014-07-21T00:30:00
db:CNNVDid:CNNVD-201405-126date:2014-05-09T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-02582date:2014-04-23T00:00:00
db:BIDid:66973date:2014-04-17T00:00:00
db:CNNVDid:CNNVD-201405-126date:2014-04-17T00:00:00