lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201307120224.r6C2ONhb027142@sf01web2.securityfocus.com>
Date: Fri, 12 Jul 2013 02:24:23 GMT
From: vuln-report@...ur3.us
To: bugtraq@...urityfocus.com
Subject: CVE-2013-3568 - Linksys CSRF + Root Command Injection

Hi list,
I would like to inform you that the latest available Linksys WRT110 firmware is prone to root shell command injection via cross-site request forgery.  This vulnerability is the result of the web interface's failure to sanitize ping targets as well as a lack of csrf tokens.  Linksys/Belkin has responded to my report to say that the vulnerability is mitigated by a 10 minute idle-timeout feature which is available for the admin portal on this device.  It is likely that other devices with similar firmware are prone to this as well.

The command execution will not return output but it is possible to direct output into files which are available upon subsequent HTTP requests.

This issue was assigned as CVE-2013-3568.

Kind Regards,
Craig Young (@CraigTweets)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ