lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 9 Jan 2016 18:15:39 +0530
From: CSW Research Lab <disclose@...ersecurityworks.com>
To: oss-security@...ts.openwall.com, cve-assign@...re.org
Cc: fulldisclosure@...lists.org, submissions@...ketstormsecurity.com,
 fulldisclosure-request@...lists.org, bugs@...uritytracker.com,
 packet@...ketstormsecurity.com
Subject: [FD] Multiple Cross Site Scripting in Netgear Router Version
	1.0.0.24

Hi,

Can you assign CVE id to this flaw?

Details
================

#Product Vendor: Netgear
#Bug Name: Cross Site Scripting in Netgear Router Version 1.0.0.24
#Software: Netgear Router Firmware
#Version: 1.0.0.24
#Last Updated: 10-06-2015
<http://kb.netgear.com/app/answers/detail/a_id/29270/~/jnr1010-firmware-version-1.0.0.24>
#Homepage: http://netgear.com/
#Severity High
#Vulnerable URL:
http://router-ip/cgi-bin/webproc?getpage=html/page.htm&var:page=RST_status&var:menu=advanced&t=1445843230593
#Vulnerable Variable: getpage, var:page & var:menu
#Parameter: GET
#Status: Fixed
<http://kb.netgear.com/app/answers/detail/a_id/30177/~/jnr1010-firmware-version-1.0.0.32>
#CVE : not assigned
#Exploitation Requires Authentication?: no
#POC URL:
https://www.youtube.com/watch?v=ITLg-uL68CU&index=7&list=PLrTr4Cobqhhw-72HKFFuwgBu6gXJSmeoT

Description
================
Cross Site Scripting (XSS) vulnerability in Netgear Router Firmware Version
1.0.0.24. By exploiting a Cross-site scripting vulnerability the attacker
can hijack a logged in user’s session by stealing cookies. This means that
the malicious hacker can change the logged in user’s password and
invalidate the session of the victim while the hacker maintains access.

Technical Details
================

Inject the malicious JavaScript code *”></scripT><scripT>alert(1)</scripT>*
in thegetpage variable in the URL
http://router-ip/cgi-bin/webproc?getpage=html/page.htm&var:page=RST_status&var:menu=advanced&t=1445843230593
and viewing it on browser will result in execution of Cross Site Scripting
(XSS)

*Note: *Similarly, var:page & var:menu variable is also injected with
malicious JavaScript payload and use it as a vehicle for further attack.

Advisory Timeline
================

28/10/2015 - Discovered in Netgear Router Firmware Version 1.0.0.24
28/10//2015 - Reported to vendor through support option but, no response
30/10//2015 - Reported to vendor through another support option available
here <http://support.netgear.com/for_home/default.aspx>. But, again no
response.
03/11/2015 - Finally, Technical Team started addressing about the issue
after so many follow ups through phone/mail.
13/12/2015 - Vulnerability got fixed & case was closed.
30/12/2015 - Netgear Released updated version 1.0.0.32

Fix
================
https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)

Credits & Authors
================
sathish@...ersecurityworks.com from cybersecurityworks Pvt Ltd
<http://www.cybersecurityworks.com/>

About Cybersecurityworks
================
Cybersecurity Works is basically an auditing company passionate working on
findings & reporting security flaws & vulnerabilities on web application
and network. As professionals, we handle each client differently based on
their unique requirements. Visit our website
<http://www.cybersecurityworks.com/> for more information.

-- 
----------
Cheers !!!

Team CSW Research Lab <http://www.cybersecurityworks.com>

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ