DNN (DotNetNuke) Language Flag Selector Culture XSS

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.


Synopsis :

The remote web server contains an ASP.NET application that is affected
by a cross-site scripting vulnerability.

Description :

The version of DNN installed on the remote host is affected by a
cross-site scripting vulnerability due to the application failing to
properly sanitize user-supplied input when multiple languages are
selected in the flag selector. An unauthenticated, remote attacker can
exploit this, via a specially crafted request, to execute arbitrary
script code in a user's browser session.

Note that this issue is mitigated by requiring that more than one
language be enabled and that the site must use the core language skin
object.

Note also that the application is reportedly affected by an
open-redirection vulnerability, although Nessus has not tested for
this issue.

See also :

http://www.nessus.org/u?b1cf7f79
http://www.dnnsoftware.com/platform/manage/security-center

Solution :

Upgrade to DNN version 6.2.7 / 7.0.5 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 66527 ()

Bugtraq ID: 58903

CVE ID:

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial