Submit #113810: Stored XSS in Netgear-SRX5308 Router(13)info

TitleStored XSS in Netgear-SRX5308 Router(13)
Description# Stored XSS in Netgear-SRX5308 Router ## Overview * Type: Stored XSS * Supplier: Netgear (https://www.netgear.com/) * URL: https://192.168.1.1/scgi-bin/platform.cgi?page=dmz_setup.htm * Product: SRX5308 – ProSAFE Quad WAN Gigabit SSL VPN Firewall * Affect version: (lastest) 4.3.5-3 * Firmware download: https://www.downloads.netgear.com/files/GDC/SRX5308/SRX5308_V4.3.5-3.zip ## Description The stored XSS vulnerability is at the web management interface of the affected routers. The vulnerability results from improper validation of user-supplied input in the web-based management interface. An attacker could exploit the vulnerability by sending the crafted HTTP request to affected devices. The injection happens at the "ConfigPort.LogicalIfName" parameter which isn't sanitized. ## Business Impact The stored XSS vulnerability is severe and could result in serious damage. Thus the vulnerability is very dangerous which could also result in reputational damage for the business through the impact on customers' trust. ## Steps to Reproduce 1. Configure the web IP address in POC: xss_post_poc.html(the Default IP address is: 192.168.1.1); 2. Login web through browser(default admin:password); 3. Open xss_post_poc.html with the browser. You will see an alert window pop up. ## Proof of Concept Advisory URL.
Source⚠️ https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/13
Userleetsun (ID 39457)
Submission13/04/2023 15:39 (1 Year ago)
Moderation28/04/2023 13:50 (15 days later)
StatusAccepté
VulDB Entry227671

Might our Artificial Intelligence support you?

Check our Alexa App!