what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

dotnetnukexss.txt

dotnetnukexss.txt
Posted Aug 14, 2005
Authored by Mark Woan | Site woany.co.uk

DotNetNuke versions below 3.0.12 suffer from multiple cross site scripting flaws.

tags | advisory, xss
advisories | CVE-2005-0040
SHA-256 | c2cd718a3f563a4496cb58b9ce3ec07339462cd89d63d0b53d80e0a555d3b950

dotnetnukexss.txt

Change Mirror Download

Security Advisory
-----------------


Advisory Name: Multiple DotNetNuke Cross Site Scripting (XSS)
Vulnerabilities
Release Date: 16/05/2005
Application: DotNetNuke (Multiple versions affected)
Platform: Microsoft Windows
Versions Affected: Versions below 3.0.12
Severity: Allows unauthenticated cross site scripting attacks
Author: Mark Woan (m.woan[at]eris.qinetiq.com)
Vendor Status: Informed and patch available
CVE Candidate: CAN-2005-0040
Reference: www.woany.co.uk/advisories/dotnetnukexss.txt


Overview:

DotNetNuke is an Open Source hybrid of the IBuySpy Portal. Its management
team is dedicated to the ongoing management of core portal application
enhancements.
DotNetNuke provides automated content management capabilities and tools to
maintain a dynamic and 100% interactive data-driven web site.


Details:

Issue 1 (XSS)
-------------
There is a vulnerability caused by the lack of input validation when
registering a new user within a DotNetNuke portal. An attacker could use a
cross site scripting
(XSS) attack when registering a new user, when the View All User Details
page the malicious code will be executed, resulting in the capture of
Administrative session credentials. Versions prior to 3.0.12 appear to be
vulnerable.

Issue 2 (Secondary XSS)
-----------------------
The User-Agent string sent with each request is stored for logging purposes.
This data comes from the client and cannot be trusted, and therefore must be
sanitised.
An attacker could set the User-Agent string for the request to malicious
script code, which would be logged and executed when any logs are viewed
that contain the User-Agent field. This attack can be utilised by an
unauthenticated user simply requesting the root page.

Issue 3 (Secondary XSS)
-----------------------
The failed logon Username is stored and displayed on the Log Viewer page. An
attacker can send a Logon request with malicious script set as the parameter
value, the script passed in the parameter will be executed when an
Administrative user views the Log Viewer page or any log page that displays
the failed logon Username.


Vendor Response:

05-01-2005 Contacted core development team via email
10-01-2005 Response from vendor received and confirmed
10-01-2005 Second mail sent regarding more issues
13-01-2005 Sent email asking for confirmation of second email (No vendor
response)
12-03-2005 DotNetNuke v3.0.12 released (All reported security issues fixed)


Recommendations:

Users should install DotNetNuke v3.0.12 or greater.


Notes:
Thanks to NISCC (www.niscc.gov.uk) for their help assigning the CVE
reference.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close