Security Advisory: VULN20-09-2006 - http://www.secureshapes.com/advisories/vuln20-09-2006.htm Vendor Security Bulletin: http://dotnetnuke.com/About/WhatIsDotNetNuke/SecurityPolicy/SecurityBulletin no3/tabid/990/Default.aspx ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ DotNetNuke - HTML Code Injection Vulnerability ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ * Date: 20/09/2006 * Severity: Low * Impact: Code Injection * Solution Status: Vendor Patch * Version: All versions of DotNetNuke * Vendor Website: http://dotnetnuke.com/ :: ABOUT THE SOFTWARE DotNetNuke® is an Open Source Framework ideal for creating Enterprise Web Applications. Unfortunately, DotNetNuke is vulnerable to HTML code injection. :: TECHNICAL DESCRIPTION The error variable available in the URL can be manipulated and it is possible to inject HTML code. Example: http://xxxxxx/Default.aspx?tabid=510&error=The+state+information+is+invalid+ for+this+page+and+might+be+corrupted It is possible to inject HTML code in that error variable. In particular, it also possible to reproduce the character "space" inserting some complete HTML tags such as and/or
in the injected code. This will allow the attacker to specify attributes in the HTML tags. Example: http://xxxxxxxxxxxx/Default.aspx?tabid=510&error="/>