Submit #113796: Stored XSS in Netgear-SRX5308 Router(3)信息

TitleStored XSS in Netgear-SRX5308 Router(3)
Description# Stored XSS in Netgear-SRX5308 Router ## Overview * Type: Stored XSS * Supplier: Netgear (https://www.netgear.com/) * URL: https://192.168.1.1/scgi-bin/platform.cgi?page=dmz_setup.htm * Product: SRX5308 – ProSAFE Quad WAN Gigabit SSL VPN Firewall * Affect version: (lastest) 4.3.5-3 * Firmware download: https://www.downloads.netgear.com/files/GDC/SRX5308/SRX5308_V4.3.5-3.zip ## Description The stored XSS vulnerability is at the web management interface of the affected routers. The vulnerability results from improper validation of user-supplied input in the web-based management interface. An attacker could exploit the vulnerability by sending the crafted HTTP request to affected devices. The injection exits at the "dhcp.SecDnsIPByte2" parameter which isn't sanitized. ## Business Impact The stored XSS vulnerability is severe and could result in serious damage. Thus the vulnerability is very dangerous which could also result in reputational damage for the business through the impact on customers' trust. ## Steps to Reproduce I have put the PoC (exp.py) in attachments, configure several parameters and execute it, you will see an alert window popping up. The parameters are as below: 1. username, password: visit the device's web interface (default: admin, password). 2. device_web_ip: web IP address of the target device. ## Proof of Concept After executing the PoC, the XSS payload is injected into the device, then login to the web through the browser and visit the victim URL "https://192.168.1.1/scgi-bin/platform.cgi?page=dmz_setup.htm", an alert window will pop up.
Source⚠️ https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/3
Userleetsun (ID 39457)
Submission2023-04-13 15時12分 (1 Year ago)
Moderation2023-04-28 13時50分 (15 days later)
Status已接受
VulDB Entry227662

Do you know our Splunk app?

Download it now for free!