Netgear 1.0.0.24 Cross Site Scripting
Posted on 10 January 2016
Details ================ #Product Vendor: Netgear #Bug Name: Cross Site Scripting in Netgear Router Version 1.0.0.24 #Software: Netgear Router Firmware #Version: 1.0.0.24 #Last Updated: 10-06-2015 <http://kb.netgear.com/app/answers/detail/a_id/29270/~/jnr1010-firmware-version-1.0.0.24> #Homepage: http://netgear.com/ #Severity High #Vulnerable URL: http://router-ip/cgi-bin/webproc?getpage=html/page.htm&var:page=RST_status&var:menu=advanced&t=1445843230593 #Vulnerable Variable: getpage, var:page & var:menu #Parameter: GET #Status: Fixed <http://kb.netgear.com/app/answers/detail/a_id/30177/~/jnr1010-firmware-version-1.0.0.32> #CVE : not assigned #Exploitation Requires Authentication?: no #POC URL: https://www.youtube.com/watch?v=ITLg-uL68CU&index=7&list=PLrTr4Cobqhhw-72HKFFuwgBu6gXJSmeoT Description ================ Cross Site Scripting (XSS) vulnerability in Netgear Router Firmware Version 1.0.0.24. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies. This means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. Technical Details ================ Inject the malicious JavaScript code *”></scripT><scripT>alert(1)</scripT>* in thegetpage variable in the URL http://router-ip/cgi-bin/webproc?getpage=html/page.htm&var:page=RST_status&var:menu=advanced&t=1445843230593 and viewing it on browser will result in execution of Cross Site Scripting (XSS) *Note: *Similarly, var:page & var:menu variable is also injected with malicious JavaScript payload and use it as a vehicle for further attack. Advisory Timeline ================ 28/10/2015 - Discovered in Netgear Router Firmware Version 1.0.0.24 28/10//2015 - Reported to vendor through support option but, no response 30/10//2015 - Reported to vendor through another support option available here <http://support.netgear.com/for_home/default.aspx>. But, again no response. 03/11/2015 - Finally, Technical Team started addressing about the issue after so many follow ups through phone/mail. 13/12/2015 - Vulnerability got fixed & case was closed. 30/12/2015 - Netgear Released updated version 1.0.0.32 Fix ================ https://www.owasp.org/index.php/Cross-site_Scripting_(XSS) Credits & Authors ================ sathish@cybersecurityworks.com from cybersecurityworks Pvt Ltd <http://www.cybersecurityworks.com/> About Cybersecurityworks ================ Cybersecurity Works is basically an auditing company passionate working on findings & reporting security flaws & vulnerabilities on web application and network. As professionals, we handle each client differently based on their unique requirements. Visit our website <http://www.cybersecurityworks.com/> for more information. -- ---------- Cheers !!! Team CSW Research Lab <http://www.cybersecurityworks.com>