Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-2381: IoT/Netgear-SRX5308/6 at main · leetsun/IoT

A vulnerability has been found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file scgi-bin/platform.cgi?page=bandwidth_profile.htm of the component Web Management Interface. The manipulation of the argument BandWidthProfile.ProfileName leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227659. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE
#xss#vulnerability#web#ssl

Stored XSS in Netgear-SRX5308 Router****Overview

* Type: Stored XSS
* Supplier: Netgear (https://www.netgear.com/)
* URL: https://192.168.1.1/scgi-bin/platform.cgi?page=bandwidth_profile.htm
* Product: SRX5308 – ProSAFE Quad WAN Gigabit SSL VPN Firewall
* Affect version: (lastest) 4.3.5-3
* Firmware download: https://www.downloads.netgear.com/files/GDC/SRX5308/SRX5308_V4.3.5-3.zip

Description

The stored XSS vulnerability is at the web management interface of the affected routers. The vulnerability results from improper validation of user-supplied input in the web-based management interface. An attacker could exploit the vulnerability by sending the crafted HTTP request to affected devices.

The injection exits at the parameter “BandWidthProfile.ProfileName” parameter which isn’t sanitized.

Business Impact

The stored XSS vulnerability is severe and could result in serious damage. Thus the vulnerability is very dangerous which could also result in reputational damage for the business through the impact on customers’ trust.

Steps to Reproduce

I have put the PoC (exp.py) in attachments, configure several parameters and execute it, you will see an alert window poping up. The parameters are as below:

  1. username, password: visit the device’s web interface (default: admin, password).
  2. device_web_ip: web IP address of the target device.

Proof of Concept

After executing the PoC, the xss payload is injected into the device, then login the web through browser and visit victim url "https://192.168.1.1/scgi-bin/platform.cgi?page=bandwidth_profile.htm", an alert window will pop up.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907