DNN (DotNetNuke) __dnnVariable Parameter XSS

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.


Synopsis :

The remote web server contains an ASP.NET application that is affected
by a cross-site scripting vulnerability.

Description :

The version of DNN installed on the remote host is affected by a
cross-site scripting vulnerability due to a failure to properly
sanitize user-supplied input to the ' __dnnVariable' parameter. An
unauthenticated, remote attacker can exploit this, via a specially
crafted request, to inject arbitrary HTML and script code into a
user's browser to be executed within the security context of the
affected site.

Note that the application is reportedly also affected by an additional
cross-site scripting issue as well as a redirect error that can lead
to phishing attacks
however, Nessus has not tested for these
additional issues.

See also :

http://packetstormsecurity.com/files/122792/dotnetnuke710-xss.txt
http://www.dnnsoftware.com/Platform/Manage/Security-Bulletins

Solution :

Upgrade to DNN version 6.2.9 / 7.1.1 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 69400 ()

Bugtraq ID: 61770

CVE ID: CVE-2013-4649