Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/oscarakaelvis/cve-2018-8062
Persistent XSS on Comtrend AR-5387un router
https://github.com/oscarakaelvis/cve-2018-8062
Last synced: 24 days ago
JSON representation
Persistent XSS on Comtrend AR-5387un router
- Host: GitHub
- URL: https://github.com/oscarakaelvis/cve-2018-8062
- Owner: OscarAkaElvis
- License: gpl-3.0
- Created: 2024-04-20T23:26:15.000Z (7 months ago)
- Default Branch: main
- Last Pushed: 2024-04-20T23:35:08.000Z (7 months ago)
- Last Synced: 2024-04-21T00:36:32.295Z (7 months ago)
- Language: Python
- Size: 19.5 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# CVE-2018-8062
Persistent XSS on Comtrend AR-5387un router## Exploitation explanation:
To exploit this vulnerability, once logged into the router, a WAN service must be createdClick on "Advanced Setup", "WAN Service". "Add button", "Next"
Then insert the payload into the "Enter Service Description" field. This was used for the PoC alert('xss');
Then click on "Next" four times to go on through the steps and finally click on "Apply/Save"
The result of the XSS will be displayed and triggered on the WAN services page
This exploit automatize the entire process bypassing CSRF protection and allowing to set a custom XSS payload
Happy hacking :)
## Disclosure timeline:
08/03/2018: Vulnerability was discovered10/03/2018: Reported to Mitre (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8062)
11/03/2018: Mitre answered, CVE number reserved
11/03/2018: Reported to Comtrend as part of responsible disclosure, they never answered
16/10/2020: Two years later, reported again to Comtrend and public disclosure
(https://twitter.com/OscarAkaElvis/status/1317004119509471233)18/10/2020: Exploit creation
19/10/2020: Exploit sent to exploit-db
## Related links
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8062
https://packetstormsecurity.com/files/159618/Comtrend-AR-5387un-Cross-Site-Scripting.html
https://www.exploit-db.com/exploits/48908
https://twitter.com/OscarAkaElvis/status/1317004119509471233