vendor:
httpd
by:
N/A
8,8
CVSS
HIGH
Session Stealing
287
CWE
Product Name: httpd
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: CVE-2017-6549
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2017
Session Stealing
httpd uses the function search_token_in_list to validate if a user is logged into the admin interface by checking his asus_token value. There seems to be a branch which could be a failed attempt to build in a logout functionality. If an attacker sets his cookie value to cgi_logout and puts asusrouter-Windows-IFTTT-1.0 into his User-Agent header he will be treated as signed-in if any other administrator session is active. It’s possible to execute arbitrary commands on the router if any admin session is currently active.
Mitigation:
Ensure that the authentication process is secure and that the user's session is properly validated.