what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

vuln20-09-2006.txt

vuln20-09-2006.txt
Posted Oct 2, 2006
Site secureshapes.com

DotNetNuke suffers from a flaw that allows HTML code injection.

tags | advisory
SHA-256 | 69dcedf35509c02cf1cc48d627974a16aee5425bbfe329f3838d0fb084c056c4

vuln20-09-2006.txt

Change Mirror Download
Security Advisory: VULN20-09-2006 - 
http://www.secureshapes.com/advisories/vuln20-09-2006.htm

Vendor Security Bulletin:
http://dotnetnuke.com/About/WhatIsDotNetNuke/SecurityPolicy/SecurityBulletin
no3/tabid/990/Default.aspx

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DotNetNuke - HTML Code Injection Vulnerability

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

* Date: 20/09/2006

* Severity: Low

* Impact: Code Injection

* Solution Status: Vendor Patch

* Version: All versions of DotNetNuke

* Vendor Website: http://dotnetnuke.com/

:: ABOUT THE SOFTWARE

DotNetNuke® is an Open Source Framework ideal for creating Enterprise Web
Applications.

Unfortunately, DotNetNuke is vulnerable to HTML code injection.

:: TECHNICAL DESCRIPTION

The error variable available in the URL can be manipulated and it is
possible to inject HTML code.

Example:

http://xxxxxx/Default.aspx?tabid=510&error=The+state+information+is+invalid+
for+this+page+and+might+be+corrupted

It is possible to inject HTML code in that error variable.

In particular, it also possible to reproduce the character "space" inserting
some complete HTML tags such as <script></script> and/or <form></form> in
the injected code. This will allow the attacker to specify attributes in the
HTML tags.

Example:

http://xxxxxxxxxxxx/Default.aspx?tabid=510&error="<script></script>/><iframe
<script></script>src=http://www.google.com>

or

http://xxxxxxxxxxxx/Default.aspx?tabid=510&error="<form></form>/><iframe<for
m></form>src=http://www.google.com>

In the HTML source code, this injection will result:

<form name="Form" method="post" action="/Default.aspx?tabid=510&error="
/><iframe src=http://www.google.com>" id="Form"
enctype="multipart/form-data" style="height: 100%;">

The space in the HTML code between iframe and src is generated because of
the complete tag injected previously.

:: VENDOR RESPONSE

The vendor security bulletin link is:

http://dotnetnuke.com/About/WhatIsDotNetNuke/SecurityPolicy/SecurityBulletin
no3/tabid/990/Default.aspx

The patches are available here:

http://www.dotnetnuke.com/tabid/125/default.aspx - registration needed in
order to download them

:: DISCLOSURE TIMEFRAME

04/09/2006 - Preliminary Vendor notification.

06/09/2006 - Vulnerability confirmed in all versions

17/06/2006 - DotNetNuke releases version 3.3.5 and 4.3.5 with fix

20/09/2006 - Coordinated public release.

Total Time to Fix: 13 days

:: CREDIT

The vulnerability was discovered by Roberto Suggi Liverani and Antonio Spera
of Secure Shapes.

~~~~~~~~~~~~~~~~~~~

About Secure Shapes

~~~~~~~~~~~~~~~~~~~

Secure Shapes Ltd provides vulnerability assessments , website penetration
testing , network penetration testing and security consultancy.

E-mail: contact [at] secureshapes.com

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close