ID

VAR-200607-0486


CVE

CVE-2006-3603


TITLE

FlexWATCH Network Camera of index.php Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2006-002761

DESCRIPTION

Cross-site scripting (XSS) vulnerability in index.php in FlexWATCH Network Camera 3.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the URL. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. FlexWATCH 3.0 and prior versions are affected. ---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Reversing must be a passion as your skills will be challenged on a daily basis and you will be working several hours everyday in IDA, Ollydbg, and with BinDiff. Often, it is also required that you write a PoC or even a working exploit to prove that an issue is exploitable. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: FlexWATCH Network Camera FW-3400 Two Vulnerabilities SECUNIA ADVISORY ID: SA20994 VERIFY ADVISORY: http://secunia.com/advisories/20994/ CRITICAL: Less critical IMPACT: Security Bypass, Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: FlexWATCH Network Camera FW-3400 http://secunia.com/product/10980/ DESCRIPTION: Jaime Blasco has reported two vulnerabilities in FlexWATCH Network Camera FW-3400, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions. Example: http://[host]/[code] 2) An input validation error in the HTTP request handling can be exploited to access the administration section without being authenticated via the "..%2f" directory traversal sequence. SOLUTION: Filter malicious characters and character sequences in a proxy server or firewall with URL filtering capabilities. PROVIDED AND/OR DISCOVERED BY: Jaime Blasco ORIGINAL ADVISORY: Digital Armaments: http://www.digitalarmaments.com/2006300687985463.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2006-3603 // JVNDB: JVNDB-2006-002761 // BID: 18936 // VULHUB: VHN-19711 // VULMON: CVE-2006-3603 // PACKETSTORM: 48144

AFFECTED PRODUCTS

vendor:seyeonmodel:flexwatch network camerascope:eqversion:3.0

Trust: 1.6

vendor:seyeonmodel:flexwatch network camerascope:lteversion:3.0

Trust: 0.8

vendor:flexbackupmodel:flexbackupscope:eqversion:1.2.1

Trust: 0.3

sources: BID: 18936 // JVNDB: JVNDB-2006-002761 // CNNVD: CNNVD-200607-277 // NVD: CVE-2006-3603

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-3603
value: MEDIUM

Trust: 1.0

NVD: CVE-2006-3603
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200607-277
value: MEDIUM

Trust: 0.6

VULHUB: VHN-19711
value: MEDIUM

Trust: 0.1

VULMON: CVE-2006-3603
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-3603
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-19711
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-19711 // VULMON: CVE-2006-3603 // JVNDB: JVNDB-2006-002761 // CNNVD: CNNVD-200607-277 // NVD: CVE-2006-3603

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-3603

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200607-277

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 48144 // CNNVD: CNNVD-200607-277

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-002761

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-19711 // VULMON: CVE-2006-3603

EXTERNAL IDS

db:NVDid:CVE-2006-3603

Trust: 2.6

db:BIDid:18936

Trust: 2.1

db:SECUNIAid:20994

Trust: 1.9

db:JVNDBid:JVNDB-2006-002761

Trust: 0.8

db:CNNVDid:CNNVD-200607-277

Trust: 0.7

db:BUGTRAQid:20061103 RE: DIGITAL ARMAMENTS SECURITY ADVISORY 10.07.2006: FLEXWATH AUTHORIZATION BYPASSING AND XSS VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20060721 RE: DIGITAL ARMAMENTS SECURITY ADVISORY 10.07.2006: FLEXWATH AUTHORIZATION BYPASSING AND XSS VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20060710 DIGITAL ARMAMENTS SECURITY ADVISORY 10.07.2006: FLEXWATH AUTHORIZATION BYPASSING AND XSS VULNERABILITY

Trust: 0.6

db:XFid:27655

Trust: 0.6

db:EXPLOIT-DBid:28205

Trust: 0.2

db:SEEBUGid:SSVID-81782

Trust: 0.1

db:VULHUBid:VHN-19711

Trust: 0.1

db:VULMONid:CVE-2006-3603

Trust: 0.1

db:PACKETSTORMid:48144

Trust: 0.1

sources: VULHUB: VHN-19711 // VULMON: CVE-2006-3603 // BID: 18936 // JVNDB: JVNDB-2006-002761 // PACKETSTORM: 48144 // CNNVD: CNNVD-200607-277 // NVD: CVE-2006-3603

REFERENCES

url:http://www.digitalarmaments.com/2006300687985463.html

Trust: 1.9

url:http://www.securityfocus.com/bid/18936

Trust: 1.8

url:http://secunia.com/advisories/20994

Trust: 1.8

url:http://www.securityfocus.com/archive/1/439648/100/0/threaded

Trust: 1.2

url:http://www.securityfocus.com/archive/1/440893/100/100/threaded

Trust: 1.2

url:http://www.securityfocus.com/archive/1/450478/100/0/threaded

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/27655

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3603

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-3603

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/27655

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/439648/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/450478/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/440893/100/100/threaded

Trust: 0.6

url:/archive/1/439648

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/28205/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/10980/

Trust: 0.1

url:http://[host]/[code]

Trust: 0.1

url:http://secunia.com/advisories/20994/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-19711 // VULMON: CVE-2006-3603 // BID: 18936 // JVNDB: JVNDB-2006-002761 // PACKETSTORM: 48144 // CNNVD: CNNVD-200607-277 // NVD: CVE-2006-3603

CREDITS

Jaime Blasco is credited with the discovery of this vulnerability.

Trust: 0.9

sources: BID: 18936 // CNNVD: CNNVD-200607-277

SOURCES

db:VULHUBid:VHN-19711
db:VULMONid:CVE-2006-3603
db:BIDid:18936
db:JVNDBid:JVNDB-2006-002761
db:PACKETSTORMid:48144
db:CNNVDid:CNNVD-200607-277
db:NVDid:CVE-2006-3603

LAST UPDATE DATE

2024-08-14T14:53:31.921000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-19711date:2018-10-18T00:00:00
db:VULMONid:CVE-2006-3603date:2018-10-18T00:00:00
db:BIDid:18936date:2006-11-06T17:02:00
db:JVNDBid:JVNDB-2006-002761date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200607-277date:2006-07-19T00:00:00
db:NVDid:CVE-2006-3603date:2024-02-14T01:17:43.863

SOURCES RELEASE DATE

db:VULHUBid:VHN-19711date:2006-07-18T00:00:00
db:VULMONid:CVE-2006-3603date:2006-07-18T00:00:00
db:BIDid:18936date:2006-07-11T00:00:00
db:JVNDBid:JVNDB-2006-002761date:2012-12-20T00:00:00
db:PACKETSTORMid:48144date:2006-07-12T07:20:23
db:CNNVDid:CNNVD-200607-277date:2006-07-18T00:00:00
db:NVDid:CVE-2006-3603date:2006-07-18T15:37:00