ID

VAR-E-201104-0421


TITLE

o2 DSL Router Classic Cross Site Request Forgery and HTML Injection Vulnerabilities

Trust: 0.3

sources: BID: 47261

DESCRIPTION

o2 DSL Router Classic is prone to a cross-site request-forgery vulnerability and multiple HTML-injection vulnerabilities.
An attacker can exploit the cross-site request-forgery issue to perform unauthorized actions in the context of a user's session. This may aid in other attacks.
The attacker can exploit the HTML-injection issues to execute arbitrary script code in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials, or to control how the site is rendered. Other attacks are also possible.

Trust: 0.3

sources: BID: 47261

AFFECTED PRODUCTS

vendor:telefónica germanymodel:& co. ohg o2 dsl router classicscope:eqversion:0

Trust: 0.3

sources: BID: 47261

EXPLOIT

An attacker can exploit these issues with readily available tools.
Bullet list:
<li><a href="/data/vulnerabilities/exploits/47261.txt">/data/vulnerabilities/exploits/47261.txt</a></li>

Trust: 0.3

sources: BID: 47261

PRICE

Free

Trust: 0.3

sources: BID: 47261

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 47261

CREDITS

Hanno Böck

Trust: 0.3

sources: BID: 47261

EXTERNAL IDS

db:BIDid:47261

Trust: 0.3

sources: BID: 47261

REFERENCES

url:http://www.o2online.de/dsl/o2-dsl-router.html

Trust: 0.3

url:http://permalink.gmane.org/gmane.comp.security.full-disclosure/78943

Trust: 0.3

sources: BID: 47261

SOURCES

db:BIDid:47261

LAST UPDATE DATE

2022-07-27T09:45:33.436000+00:00


SOURCES UPDATE DATE

db:BIDid:47261date:2011-04-07T00:00:00

SOURCES RELEASE DATE

db:BIDid:47261date:2011-04-07T00:00:00