lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAMWaY3N380NZtKUf+vet1ktyTnRyHt_Z-8qEfzp2HT_yPJ3k=A@mail.gmail.com> Date: Sat, 9 Jan 2016 18:15:39 +0530 From: CSW Research Lab <disclose@...ersecurityworks.com> To: oss-security@...ts.openwall.com, cve-assign@...re.org Cc: fulldisclosure@...lists.org, submissions@...ketstormsecurity.com, fulldisclosure-request@...lists.org, bugs@...uritytracker.com, packet@...ketstormsecurity.com Subject: [FD] Multiple Cross Site Scripting in Netgear Router Version 1.0.0.24 Hi, Can you assign CVE id to this flaw? Details ================ #Product Vendor: Netgear #Bug Name: Cross Site Scripting in Netgear Router Version 1.0.0.24 #Software: Netgear Router Firmware #Version: 1.0.0.24 #Last Updated: 10-06-2015 <http://kb.netgear.com/app/answers/detail/a_id/29270/~/jnr1010-firmware-version-1.0.0.24> #Homepage: http://netgear.com/ #Severity High #Vulnerable URL: http://router-ip/cgi-bin/webproc?getpage=html/page.htm&var:page=RST_status&var:menu=advanced&t=1445843230593 #Vulnerable Variable: getpage, var:page & var:menu #Parameter: GET #Status: Fixed <http://kb.netgear.com/app/answers/detail/a_id/30177/~/jnr1010-firmware-version-1.0.0.32> #CVE : not assigned #Exploitation Requires Authentication?: no #POC URL: https://www.youtube.com/watch?v=ITLg-uL68CU&index=7&list=PLrTr4Cobqhhw-72HKFFuwgBu6gXJSmeoT Description ================ Cross Site Scripting (XSS) vulnerability in Netgear Router Firmware Version 1.0.0.24. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies. This means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. Technical Details ================ Inject the malicious JavaScript code *”></scripT><scripT>alert(1)</scripT>* in thegetpage variable in the URL http://router-ip/cgi-bin/webproc?getpage=html/page.htm&var:page=RST_status&var:menu=advanced&t=1445843230593 and viewing it on browser will result in execution of Cross Site Scripting (XSS) *Note: *Similarly, var:page & var:menu variable is also injected with malicious JavaScript payload and use it as a vehicle for further attack. Advisory Timeline ================ 28/10/2015 - Discovered in Netgear Router Firmware Version 1.0.0.24 28/10//2015 - Reported to vendor through support option but, no response 30/10//2015 - Reported to vendor through another support option available here <http://support.netgear.com/for_home/default.aspx>. But, again no response. 03/11/2015 - Finally, Technical Team started addressing about the issue after so many follow ups through phone/mail. 13/12/2015 - Vulnerability got fixed & case was closed. 30/12/2015 - Netgear Released updated version 1.0.0.32 Fix ================ https://www.owasp.org/index.php/Cross-site_Scripting_(XSS) Credits & Authors ================ sathish@...ersecurityworks.com from cybersecurityworks Pvt Ltd <http://www.cybersecurityworks.com/> About Cybersecurityworks ================ Cybersecurity Works is basically an auditing company passionate working on findings & reporting security flaws & vulnerabilities on web application and network. As professionals, we handle each client differently based on their unique requirements. Visit our website <http://www.cybersecurityworks.com/> for more information. -- ---------- Cheers !!! Team CSW Research Lab <http://www.cybersecurityworks.com> _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists