CVE-2007-6708 |
|
发布时间 :2008-03-13 14:44:00 | ||
修订时间 :2008-11-15 02:06:13 | ||||
NMCO |
[原文]Multiple cross-site request forgery (CSRF) vulnerabilities on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.01.03 and earlier firmware allow remote attackers to perform actions as administrators via an arbitrary valid request to an administrative URI, as demonstrated by (1) a Restore Factory Defaults action using the mtenRestore parameter to setup.cgi and (2) creation of a user account using the sysname parameter to setup.cgi.
[CNNVD]Cisco Linksys WAG54GS Wireless-G ADSL Gateway firmware多个跨站请求伪造漏洞(CNNVD-200803-208)
Cisco Linksys WAG54GS Wireless-G ADSL Gateway 和firmware存在多个跨站请求伪造漏洞。远程攻击者通过一个任意有效请求到达一个管理的URI( 例如(1) 一个 Restore Factory Defaults操作运行mtenRestore 参数至to setup.cgi以及 (2)一个用户帐户的建立会运行sysname参数至setup.cgi),来执行操作。
–
CVSS (基础分值)
CVSS分值: | 4.3 | [中等(MEDIUM)] |
机密性影响: | NONE | [对系统的机密性无影响] |
完整性影响: | PARTIAL | [可能会导致系统文件被修改] |
可用性影响: | NONE | [对系统可用性无影响] |
攻击复杂度: | MEDIUM | [漏洞利用存在一定的访问条件] |
攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
CWE-352 | [跨站请求伪造(CSRF)] |
–
CPE (受影响的平台与产品)
产品及版本信息(CPE)暂不可用 |
–
OVAL (用于检测的技术细节)
未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
http://xforce.iss.net/xforce/xfdb/41269 (UNKNOWN) XF linksys-wag54gs-setup-csfr(41269) |
http://www.securityfocus.com/archive/1/archive/1/489009/100/0/threaded (UNKNOWN) BUGTRAQ 20080301 The Router Hacking Challenge is Over! |
http://www.gnucitizen.org/projects/router-hacking-challenge/ (UNKNOWN) MISC http://www.gnucitizen.org/projects/router-hacking-challenge/ |
http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/ (UNKNOWN) MISC http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/ |
http://osvdb.org/43538 (UNKNOWN) OSVDB 43538 |
http://osvdb.org/43537 (UNKNOWN) OSVDB 43537 |
–
漏洞信息
Cisco Linksys WAG54GS Wireless-G ADSL Gateway firmware多个跨站请求伪造漏洞 | |
中危 | 跨站请求伪造 |
2008-03-13 00:00:00 | 2008-03-14 00:00:00 |
远程 | |
Cisco Linksys WAG54GS Wireless-G ADSL Gateway 和firmware存在多个跨站请求伪造漏洞。远程攻击者通过一个任意有效请求到达一个管理的URI( 例如(1) 一个 Restore Factory Defaults操作运行mtenRestore 参数至to setup.cgi以及 (2)一个用户帐户的建立会运行sysname参数至setup.cgi),来执行操作。 |
–
公告与补丁
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://www.linksysbycisco.com/US/en/support/WAG54GS |
–
漏洞信息
43537 |
|
Cisco Linksys WAG54GS ADSL Gateway setup.cgi Restore Factory Defaults Action mtenRestore Parameter CSRF | |
Remote / Network Access, Wireless Vector |
Input Manipulation |
Loss of Integrity | |
Exploit Public | Uncoordinated Disclosure |
–
漏洞描述
–
时间线
2007-11-20 |
Unknow |
Unknow | Unknow |