ID

VAR-201912-0715


CVE

CVE-2019-20076


TITLE

NETCORE Netis DL4323 Cross-Site Scripting Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2020-01646 // CNNVD: CNNVD-201912-1206

DESCRIPTION

On Netis DL4323 devices, XSS exists via the form2Ddns.cgi username parameter (DynDns settings of the Dynamic DNS Configuration). Netis DL4323 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. NETCORE Netis DL4323 is a multifunctional modem from China Netcore Corporation. A cross-site scripting vulnerability exists in NETCORE Netis DL4323. The vulnerability stems from the lack of proper verification of client data by web applications. Attackers can use this vulnerability to execute client code

Trust: 2.16

sources: NVD: CVE-2019-20076 // JVNDB: JVNDB-2019-013473 // CNVD: CNVD-2020-01646

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-01646

AFFECTED PRODUCTS

vendor:netismodel:dl4343scope:eqversion: -

Trust: 2.2

vendor:netismodel:dl4323scope: - version: -

Trust: 0.8

vendor:netcoremodel:netis dl4323scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2020-01646 // JVNDB: JVNDB-2019-013473 // CNNVD: CNNVD-201912-1206 // NVD: CVE-2019-20076

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-20076
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-20076
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-01646
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201912-1206
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2019-20076
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2020-01646
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-20076
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.1

Trust: 1.0

NVD: CVE-2019-20076
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-01646 // JVNDB: JVNDB-2019-013473 // CNNVD: CNNVD-201912-1206 // NVD: CVE-2019-20076

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2019-013473 // NVD: CVE-2019-20076

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201912-1206

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201912-1206

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-013473

PATCH

title:DL4323url:http://www.netis-systems.com/Home/detail/id/75.html

Trust: 0.8

sources: JVNDB: JVNDB-2019-013473

EXTERNAL IDS

db:NVDid:CVE-2019-20076

Trust: 3.0

db:JVNDBid:JVNDB-2019-013473

Trust: 0.8

db:CNVDid:CNVD-2020-01646

Trust: 0.6

db:CNNVDid:CNNVD-201912-1206

Trust: 0.6

sources: CNVD: CNVD-2020-01646 // JVNDB: JVNDB-2019-013473 // CNNVD: CNNVD-201912-1206 // NVD: CVE-2019-20076

REFERENCES

url:https://fatihhcelik.blogspot.com/2019/12/stored-xss-on-username-input-2-netis.html

Trust: 3.0

url:https://drive.google.com/open?id=1hryqvklsxhqqb5tnhhligpyfi0y2zl80

Trust: 2.2

url:https://drive.google.com/open?id=1i5girjry5l7ltisyzp9gsvr8zgcwtnmj

Trust: 2.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-20076

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-20076

Trust: 0.8

sources: CNVD: CNVD-2020-01646 // JVNDB: JVNDB-2019-013473 // CNNVD: CNNVD-201912-1206 // NVD: CVE-2019-20076

SOURCES

db:CNVDid:CNVD-2020-01646
db:JVNDBid:JVNDB-2019-013473
db:CNNVDid:CNNVD-201912-1206
db:NVDid:CVE-2019-20076

LAST UPDATE DATE

2024-11-23T23:01:34.382000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-01646date:2020-01-13T00:00:00
db:JVNDBid:JVNDB-2019-013473date:2020-01-07T00:00:00
db:CNNVDid:CNNVD-201912-1206date:2019-12-31T00:00:00
db:NVDid:CVE-2019-20076date:2024-11-21T04:38:00.913

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-01646date:2020-01-09T00:00:00
db:JVNDBid:JVNDB-2019-013473date:2020-01-07T00:00:00
db:CNNVDid:CNNVD-201912-1206date:2019-12-29T00:00:00
db:NVDid:CVE-2019-20076date:2019-12-30T00:15:11.753