Description
A remote attacker can conduct a cross-site request forgery (CSRF) attack on OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028. The vulnerability is due to insufficient CSRF protections for the "mgm_config_file.asp" because of which attacker can create a crafted "csrf form" which sends " malicious xml data" to "/boaform/admin/formMgmConfigUpload". the exploit allows attacker to "gain full privileges" and to "fully compromise of router & network".
Affected Software
{"id": "CVE-2020-23585", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2020-23585", "description": "A remote attacker can conduct a cross-site request forgery (CSRF) attack on OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028. The vulnerability is due to insufficient CSRF protections for the \"mgm_config_file.asp\" because of which attacker can create a crafted \"csrf form\" which sends \" malicious xml data\" to \"/boaform/admin/formMgmConfigUpload\". the exploit allows attacker to \"gain full privileges\" and to \"fully compromise of router & network\".", "published": "2022-11-23T01:15:00", "modified": "2022-11-23T20:11:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23585", "reporter": "cve@mitre.org", "references": ["https://github.com/huzaifahussain98/CVE-2020-23585"], "cvelist": ["CVE-2020-23585"], "immutableFields": [], "lastseen": "2022-11-23T21:38:23", "viewCount": 9, "enchantments": {"score": {"value": 5.1, "vector": "NONE"}, "twitter": {"counter": 7, "tweets": [{"link": "https://twitter.com/xanadulinux/status/1595309353392668672", "text": "CVE-2020-23585 https://t.co/WHg1yoFJBY", "author": "xanadulinux", "author_photo": "https://pbs.twimg.com/profile_images/466955855892455424/BAnnwGhT_400x400.png"}, {"link": "https://twitter.com/4ng3n01r3/status/1595325119723106304", "text": "/hashtag/CyberSecurity?src=hashtag_click /hashtag/Security?src=hashtag_click /hashtag/CERT?src=hashtag_click /hashtag/CVE?src=hashtag_click /hashtag/Nist?src=hashtag_click /hashtag/breach?src=hashtag_click /hashtag/vulnerability?src=hashtag_click : CVE-2020-23585 https://t.co/PamHqJIrmf", "author": "4ng3n01r3", "author_photo": "https://pbs.twimg.com/profile_images/1566682883670118404/pHq2hcfz_400x400.jpg"}, {"link": "https://twitter.com/vulnonym/status/1595317164763930624", "text": "CVE-2020-23585 shall henceforth be named Blas Paradise\nhttps://t.co/RL1oxdHwAR", "author": "vulnonym", "author_photo": "https://pbs.twimg.com/profile_images/1235605772878438405/6p9IJVtn_400x400.jpg"}, {"link": "https://twitter.com/4ng3n01r3/status/1595536517111623680", "text": "/hashtag/CyberSecurity?src=hashtag_click /hashtag/Security?src=hashtag_click /hashtag/CERT?src=hashtag_click /hashtag/CVE?src=hashtag_click /hashtag/Nist?src=hashtag_click /hashtag/breach?src=hashtag_click /hashtag/vulnerability?src=hashtag_click : CVE-2020-23585 (op-xt71000n_firmware) https://t.co/PamHqJIrmf", "author": "4ng3n01r3", "author_photo": "https://pbs.twimg.com/profile_images/1566682883670118404/pHq2hcfz_400x400.jpg"}]}, "affected_software": {"major_version": [{"name": "optilinknetwork op-xt71000n firmware", "version": 3}]}, "vulnersScore": 5.1}, "_state": {"dependencies": 1669239584, "score": 1669239754, "twitter": 1669243223, "affected_software_major_version": 1671611801}, "_internal": {"score_hash": "71f2b12465e04576865c77ea62d06683"}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028"], "cpe23": ["cpe:2.3:o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028:*:*:*:*:*:*:*"], "cwe": ["CWE-352"], "affectedSoftware": [{"cpeName": "optilinknetwork:op-xt71000n_firmware", "version": "3.3.1-191028", "operator": "eq", "name": "optilinknetwork op-xt71000n firmware"}], "affectedConfiguration": [{"name": "optilinknetwork op-xt71000n", "cpeName": "optilinknetwork:op-xt71000n", "version": "2.2", "operator": "eq"}], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "AND", "children": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028:*:*:*:*:*:*:*", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": false, "cpe23Uri": "cpe:2.3:h:optilinknetwork:op-xt71000n:2.2:*:*:*:*:*:*:*", "cpe_name": []}]}], "cpe_match": []}]}, "extraReferences": [{"url": "https://github.com/huzaifahussain98/CVE-2020-23585", "name": "https://github.com/huzaifahussain98/CVE-2020-23585", "refsource": "MISC", "tags": ["Third Party Advisory"]}]}
{}