lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 11 Dec 2008 12:55:26 +0300
From: "Vladimir '3APA3A' Dubrovin" <3APA3A@...URITY.NNOV.RU>
To: s.gottschall@...wrt.com
Cc: bugtraq@...urityfocus.com
Subject: Re[2]: Multiple XSRF in DD-WRT (Remote Root Command Execution)

Dear s.gottschall@...wrt.com,

 According   to   current  practices,  it's  considered  as  a  security
 vulnerability. The fact you must be logged in to device in browser is a
 mitigation factor.

 To  protect routers against attacks like this either generate some kind
 of  non-predictable  session  id as a hidden field in any HTML form and
 check this id or check Referer:.

--Wednesday, December 10, 2008, 3:22:56 PM, you wrote to bugtraq@...urityfocus.com:

sgdwc> this is no security flaw since you must be already logged in
within the webinterface of dd-wrt. otherwise this here will not work. we
already fixed this issue in our sourcetree



-- 
~/ZARAZA http://securityvulns.com/
Патриотизм - это та же религия. (Твен)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ