Short Name |
DHCP:EXPLOIT:HOSTNAME-HTML |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
DHCP |
Keywords |
HTML Tags in DHCP Request |
Release Date |
2004/10/20 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects HTML tags embedded in the HOSTNAME field of a DHCP request. Attackers can use this technique to force the administrators of some DHCP servers to execute code when viewing logs with a HTML-parsing viewer.
It is reported that the DI-614+, DI-704, and the DI-624 are susceptible to an HTML injection vulnerability in their DHCP log. An attacker who has access to the wireless, or internal network segments of the router can craft malicious DHCP hostnames, that when sent to the router, will be logged for later viewing by the administrator of the device. The injected HTML can be used to cause the administrator to make unintended changes to the configuration of the router. Other attacks may be possible. Although only the DI-614+, DI-704, and the DI-624 are reported vulnerable, code reuse across devices is common and other products may also be affected.