The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of SpeedTouch: Cross Site Scripting

Synthesis of the vulnerability 

The "name" parameter of LocalNetwork page can be used to conduct a Cross Site Scripting attack.
Impacted products: SpeedTouch.
Severity of this bulletin: 2/4.
Creation date: 28/02/2006.
Références of this threat: BID-16839, CVE-2006-0947, VIGILANCE-VUL-5655.

Description of the vulnerability 

The SpeedTouch modem has a web administration interface.

The local network interface (LocalNetwork) web page uses a "name" parameter. This parameter is displayed without being sanitized.

An attacker can therefore create a malicious url and invite user to connect to administrative interface. The JavaScript code contained in the clicked link will be run in the modem's context.

This vulnerability thus permits attacker to execute administrative tasks, when user clicks on the link.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability impacts software or systems such as SpeedTouch.

Our Vigil@nce team determined that the severity of this security announce is medium.

The trust level is of type confirmed by a trusted third party, with an origin of document.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this computer vulnerability note.

Solutions for this threat 

Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides computers vulnerabilities bulletins. The technology watch team tracks security threats targeting the computer system.