XSS in Netgear-SRX5308 Router
Overview
* Type: XSS
* Supplier: Netgear (https://www.netgear.com/)
* URL: https://192.168.1.1
* Product: SRX5308 – ProSAFE Quad WAN Gigabit SSL VPN Firewall
* Affect version: (lastest) 4.3.5-3
* Firmware download: https://www.downloads.netgear.com/files/GDC/SRX5308/SRX5308_V4.3.5-3.zip
Description
The XSS vulnerability is at the web management interface of the affected routers. The vulnerability results from improper validation of user-supplied input. An attacker could exploit the vulnerability by sending the crafted HTTP request to affected devices.
The injection happend at the parameter "wanName" parameter which isn't sanitized.
Business Impact
The vulnerability is very dangerous which could also result in reputational damage for the business through the impact on customers' trust.
Steps to Reproduce
- Configure the web IP address in POC: xss_post_poc.html(the Default IP address is: 192.168.1.1).
- Log in web interface through the browser(default admin:password).
- Open xss_post_poc-Before-Authen.html in the browser. You will see an alert window pop up.
Proof of Concept