[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 11 Dec 2008 12:55:26 +0300
From: "Vladimir '3APA3A' Dubrovin" <3APA3A@...URITY.NNOV.RU>
To: s.gottschall@...wrt.com
Cc: bugtraq@...urityfocus.com
Subject: Re[2]: Multiple XSRF in DD-WRT (Remote Root Command Execution)
Dear s.gottschall@...wrt.com,
According to current practices, it's considered as a security
vulnerability. The fact you must be logged in to device in browser is a
mitigation factor.
To protect routers against attacks like this either generate some kind
of non-predictable session id as a hidden field in any HTML form and
check this id or check Referer:.
--Wednesday, December 10, 2008, 3:22:56 PM, you wrote to bugtraq@...urityfocus.com:
sgdwc> this is no security flaw since you must be already logged in
within the webinterface of dd-wrt. otherwise this here will not work. we
already fixed this issue in our sourcetree
--
~/ZARAZA http://securityvulns.com/
Патриотизм - это та же религия. (Твен)
Powered by blists - more mailing lists