Summary
This host is running HomeSeer HS2 and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in the context of a vulnerable site and gain sensitive information via directory traversal attacks.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaws are due to improper validation of user-supplied input passed via the URL, which allows attacker to conduct stored and reflective xss by sending a crafted request with JavaScript to web interface and causing the JavaScript to be stored in the log viewer page.
Affected
HomeSeer HS2 version 2.5.0.20
References
Severity
Classification
-
CVE CVE-2011-4835, CVE-2011-4836, CVE-2011-4837 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Awstats Configuration File Remote Arbitrary Command Execution Vulnerability
- artmedic_links5 File Inclusion Vulnerability
- 68designs 68kb Multiple Remote File Include Vulnerabilities
- A-A-S Application Access Server Multiple Vulnerabilities
- Alcatel-Lucent OmniPCX Enterprise Remote Command Execution Vulnerability