ID

VAR-201401-0271


CVE

CVE-2013-6786


TITLE

Used in multiple products Allegro RomPager Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2013-005853

DESCRIPTION

Cross-site scripting (XSS) vulnerability in Allegro RomPager before 4.51, as used on the ZyXEL P660HW-D1, Huawei MT882, Sitecom WL-174, TP-LINK TD-8816, and D-Link DSL-2640R and DSL-2641R, when the "forbidden author header" protection mechanism is bypassed, allows remote attackers to inject arbitrary web script or HTML by requesting a nonexistent URI in conjunction with a crafted HTTP Referer header that is not properly handled in a 404 page. NOTE: there is no CVE for a "URL redirection" issue that some sources list separately. Allegro RomPager is prone to a URI-redirection vulnerability and a cross-site scripting vulnerability because the application fails to sufficiently sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible. Allegro RomPager 4.07 is vulnerable; other versions may also be affected. Allegro Software Development RomPager is an embedded Web server toolkit from Allegro Software Development in the United States, which allows users to use a common Web browser to manage and control the World Wide Web (WWW) services of network devices such as network printers, switches and routers. The following products and models are affected: ZyXEL P660HW-D1, Huawei MT882, Sitecom WL-174, TP-LINK TD-8816, D-Link DSL-2640R and DSL-2641R

Trust: 2.07

sources: NVD: CVE-2013-6786 // JVNDB: JVNDB-2013-005853 // BID: 63721 // VULHUB: VHN-66788 // VULMON: CVE-2013-6786

AFFECTED PRODUCTS

vendor:tp linkmodel:td-8816scope:eqversion: -

Trust: 1.0

vendor:sitecommodel:wl-174scope:eqversion: -

Trust: 1.0

vendor:zyxelmodel:p-660hw d1scope:eqversion: -

Trust: 1.0

vendor:allegrosoftmodel:rompagerscope:lteversion:4.07

Trust: 1.0

vendor:dlinkmodel:dsl-2640rscope:eqversion: -

Trust: 1.0

vendor:dlinkmodel:dsl-2641rscope:eqversion: -

Trust: 1.0

vendor:huaweimodel:mt882scope:eqversion: -

Trust: 1.0

vendor:allegromodel:rompagerscope:ltversion:4.51

Trust: 0.8

vendor:d linkmodel:dsl-2640rscope: - version: -

Trust: 0.8

vendor:d linkmodel:dsl-2641rscope: - version: -

Trust: 0.8

vendor:huaweimodel:smartax mt882scope: - version: -

Trust: 0.8

vendor:sitecommodel:wl-174scope: - version: -

Trust: 0.8

vendor:tp linkmodel:td-8816scope: - version: -

Trust: 0.8

vendor:zyxelmodel:p-660hw-d1scope: - version: -

Trust: 0.8

vendor:d linkmodel:dsl-2641rscope:eqversion: -

Trust: 0.6

vendor:d linkmodel:dsl-2640rscope:eqversion: -

Trust: 0.6

vendor:zyxelmodel:p660hw-d1scope:eqversion:0

Trust: 0.3

vendor:tp linkmodel:td-8816scope:eqversion:0

Trust: 0.3

vendor:sitecommodel:wl-174scope:eqversion:0

Trust: 0.3

vendor:huaweimodel:mt882scope:eqversion:0

Trust: 0.3

vendor:d linkmodel:dsl-2641rscope:eqversion:0

Trust: 0.3

vendor:d linkmodel:dsl-2640rscope:eqversion:0

Trust: 0.3

vendor:allegromodel:rompagerscope:eqversion:4.07

Trust: 0.3

vendor:allegromodel:rompagerscope:neversion:4.51

Trust: 0.3

sources: BID: 63721 // JVNDB: JVNDB-2013-005853 // CNNVD: CNNVD-201311-215 // NVD: CVE-2013-6786

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-6786
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-6786
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201311-215
value: MEDIUM

Trust: 0.6

VULHUB: VHN-66788
value: MEDIUM

Trust: 0.1

VULMON: CVE-2013-6786
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-6786
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-66788
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-66788 // VULMON: CVE-2013-6786 // JVNDB: JVNDB-2013-005853 // CNNVD: CNNVD-201311-215 // NVD: CVE-2013-6786

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-66788 // JVNDB: JVNDB-2013-005853 // NVD: CVE-2013-6786

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201311-215

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201311-215

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-005853

PATCH

title:RomPager Embedded Web Server Toolkitsurl:http://www.allegrosoft.com/embedded-web-server

Trust: 0.8

title:Allegro RomPager HTTP Referer Header URI Fixes for cross-site scripting vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=234984

Trust: 0.6

title:cve-searchurl:https://github.com/r3p3r/cve-search

Trust: 0.1

title:cve-searchurl:https://github.com/extremenetworks/cve-search-src

Trust: 0.1

title:cve-searchurl:https://github.com/dim0niu/cve-search

Trust: 0.1

title:cve-searchurl:https://github.com/cve-search/cve-search

Trust: 0.1

title:cve-searchurl:https://github.com/pgurudatta/cve-search

Trust: 0.1

title:cve-searchurl:https://github.com/kawtar01/cve-search

Trust: 0.1

title:cve-searchurl:https://github.com/miradam/cve-search

Trust: 0.1

title:cve-searchurl:https://github.com/zwei2008/cve

Trust: 0.1

title:Instruction and Implementation cve-searchurl:https://github.com/swastik99/cve-search-master

Trust: 0.1

title:cve-searchurl:https://github.com/cve-search/cve-search-ng

Trust: 0.1

title:cve-searchurl:https://github.com/jerfinj/cve-search

Trust: 0.1

title:Instruction and Implementation cve-searchurl:https://github.com/swastik99/cve-search

Trust: 0.1

title:cve-searchurl:https://github.com/HR-CERT/modified_cve-search

Trust: 0.1

sources: VULMON: CVE-2013-6786 // JVNDB: JVNDB-2013-005853 // CNNVD: CNNVD-201311-215

EXTERNAL IDS

db:NVDid:CVE-2013-6786

Trust: 2.9

db:OSVDBid:99694

Trust: 1.8

db:JVNDBid:JVNDB-2013-005853

Trust: 0.8

db:CNNVDid:CNNVD-201311-215

Trust: 0.7

db:BIDid:63721

Trust: 0.5

db:VULHUBid:VHN-66788

Trust: 0.1

db:VULMONid:CVE-2013-6786

Trust: 0.1

sources: VULHUB: VHN-66788 // VULMON: CVE-2013-6786 // BID: 63721 // JVNDB: JVNDB-2013-005853 // CNNVD: CNNVD-201311-215 // NVD: CVE-2013-6786

REFERENCES

url:http://osvdb.org/ref/99/rompager407.pdf

Trust: 2.6

url:http://antoniovazquezblanco.github.io/docs/advisories/advisory_rompagerxss.pdf

Trust: 2.1

url:http://osvdb.org/99694

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6786

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6786

Trust: 0.8

url:http://www.allegrosoft.com/embedded-web-server

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.securityfocus.com/bid/63721

Trust: 0.1

url:https://github.com/r3p3r/cve-search

Trust: 0.1

url:https://github.com/dim0niu/cve-search

Trust: 0.1

sources: VULHUB: VHN-66788 // VULMON: CVE-2013-6786 // BID: 63721 // JVNDB: JVNDB-2013-005853 // CNNVD: CNNVD-201311-215 // NVD: CVE-2013-6786

CREDITS

Antonio Vzquez Blanco

Trust: 0.6

sources: CNNVD: CNNVD-201311-215

SOURCES

db:VULHUBid:VHN-66788
db:VULMONid:CVE-2013-6786
db:BIDid:63721
db:JVNDBid:JVNDB-2013-005853
db:CNNVDid:CNNVD-201311-215
db:NVDid:CVE-2013-6786

LAST UPDATE DATE

2024-11-23T22:18:42.566000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-66788date:2014-01-17T00:00:00
db:VULMONid:CVE-2013-6786date:2023-04-26T00:00:00
db:BIDid:63721date:2013-11-12T00:00:00
db:JVNDBid:JVNDB-2013-005853date:2014-01-20T00:00:00
db:CNNVDid:CNNVD-201311-215date:2023-04-27T00:00:00
db:NVDid:CVE-2013-6786date:2024-11-21T01:59:41.950

SOURCES RELEASE DATE

db:VULHUBid:VHN-66788date:2014-01-16T00:00:00
db:VULMONid:CVE-2013-6786date:2014-01-16T00:00:00
db:BIDid:63721date:2013-11-12T00:00:00
db:JVNDBid:JVNDB-2013-005853date:2014-01-20T00:00:00
db:CNNVDid:CNNVD-201311-215date:2013-11-12T00:00:00
db:NVDid:CVE-2013-6786date:2014-01-16T19:55:04.607