Vulnerability Note VU#941108

NetCommWireless NB604N ADSL2+ Wireless N300 Modem Router contains a stored cross-site scripting vulnerability

Original Release date: 06 Oct 2014 | Last revised: 06 Oct 2014

Overview

NetCommWireless NB604N ADSL2+ Wireless N300 Modem Router contains a stored cross-site scripting (XSS) vulnerability.

Description

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

NetCommWireless NB604N ADSL2+ Wireless N300 Modem Routers running software version GAN5.CZ56T-B-NC.AU-R4B010.EN contain a stored cross-site scripting (XSS) vulnerability. A remote attacker can perform a stored cross-site scripting (XSS) attack against an authenticated user through the web interface by manipulating single quotes in the WPA key variable (wlWpaPsk). The Wireless -> Security page (wlsecurity.html) contains an unsanitized parameter wlWpaPsk which, when submitted, is stored as the Javascript variable wpaPskKey.

Impact

A remote attacker can perform a stored cross-site scripting (XSS) attack against an authenticated user through the web interface allowing them to run scripts with the permission of the authenticated user.

Solution

Apply an Update
NetCommWireless has provided an updated firmware version, GAN5.CZ56T-B-NC.AU-R4B030.EN, for download on their support site.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
NetComm Wireless LimitedAffected05 Sep 201406 Oct 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 3.5 AV:N/AC:M/Au:S/C:P/I:N/A:N
Temporal 3.1 E:POC/RL:U/RC:ND
Environmental 2.3 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Katie Duczmal for reporting this vulnerability.

This document was written by Chris King.

Other Information

  • CVE IDs: CVE-2014-4871
  • Date Public: 06 Oct 2014
  • Date First Published: 06 Oct 2014
  • Date Last Updated: 06 Oct 2014
  • Document Revision: 7

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.