Full Disclosure mailing list archives

Multiple Cross Site Scripting in Netgear Router Version 1.0.0.24


From: CSW Research Lab <disclose () cybersecurityworks com>
Date: Sat, 9 Jan 2016 18:15:39 +0530

Hi,

Can you assign CVE id to this flaw?

Details
================

#Product Vendor: Netgear
#Bug Name: Cross Site Scripting in Netgear Router Version 1.0.0.24
#Software: Netgear Router Firmware
#Version: 1.0.0.24
#Last Updated: 10-06-2015
<http://kb.netgear.com/app/answers/detail/a_id/29270/~/jnr1010-firmware-version-1.0.0.24>
#Homepage: http://netgear.com/
#Severity High
#Vulnerable URL:
http://router-ip/cgi-bin/webproc?getpage=html/page.htm&var:page=RST_status&var:menu=advanced&t=1445843230593
#Vulnerable Variable: getpage, var:page & var:menu
#Parameter: GET
#Status: Fixed
<http://kb.netgear.com/app/answers/detail/a_id/30177/~/jnr1010-firmware-version-1.0.0.32>
#CVE : not assigned
#Exploitation Requires Authentication?: no
#POC URL:
https://www.youtube.com/watch?v=ITLg-uL68CU&index=7&list=PLrTr4Cobqhhw-72HKFFuwgBu6gXJSmeoT

Description
================
Cross Site Scripting (XSS) vulnerability in Netgear Router Firmware Version
1.0.0.24. By exploiting a Cross-site scripting vulnerability the attacker
can hijack a logged in user’s session by stealing cookies. This means that
the malicious hacker can change the logged in user’s password and
invalidate the session of the victim while the hacker maintains access.

Technical Details
================

Inject the malicious JavaScript code *”></scripT><scripT>alert(1)</scripT>*
in thegetpage variable in the URL
http://router-ip/cgi-bin/webproc?getpage=html/page.htm&var:page=RST_status&var:menu=advanced&t=1445843230593
and viewing it on browser will result in execution of Cross Site Scripting
(XSS)

*Note: *Similarly, var:page & var:menu variable is also injected with
malicious JavaScript payload and use it as a vehicle for further attack.

Advisory Timeline
================

28/10/2015 - Discovered in Netgear Router Firmware Version 1.0.0.24
28/10//2015 - Reported to vendor through support option but, no response
30/10//2015 - Reported to vendor through another support option available
here <http://support.netgear.com/for_home/default.aspx>. But, again no
response.
03/11/2015 - Finally, Technical Team started addressing about the issue
after so many follow ups through phone/mail.
13/12/2015 - Vulnerability got fixed & case was closed.
30/12/2015 - Netgear Released updated version 1.0.0.32

Fix
================
https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)

Credits & Authors
================
sathish () cybersecurityworks com from cybersecurityworks Pvt Ltd
<http://www.cybersecurityworks.com/>

About Cybersecurityworks
================
Cybersecurity Works is basically an auditing company passionate working on
findings & reporting security flaws & vulnerabilities on web application
and network. As professionals, we handle each client differently based on
their unique requirements. Visit our website
<http://www.cybersecurityworks.com/> for more information.

-- 
----------
Cheers !!!

Team CSW Research Lab <http://www.cybersecurityworks.com>

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Current thread: