Axis 2100 Network Camera 2.43 Cross Site Scripting

2017.08.04
Credit: Nassim Asrir
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8/10
Exploit range: Remote
Attack complexity: Low
Authentication: Single time
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

i>>?[+] Title: Axis 2100 Network Camera 2.43 - Reflected XSS [+] Credits / Discovery: Nassim Asrir [+] Author Contact: wassline@gmail.com [+] Author Company: Henceforth [+] CVE: CVE-2017-12413 Vendor: =============== https://www.axis.com/ Vulnerability Type: =================== Reflected Cross Site Scripting. issue: =================== The value of the URL path filename is copied into the HTML document as plain text between tags. The payload b8b8w<script>alert(1)</script>rw1wz was submitted in the URL path filename. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. POC: =================== http://target/admin/admin.shtmlb8b8w%3cscript%3ealert(1)%3c/script%3erw1wz Tested on: =============== Windows 7 (64 Bit)


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top