An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of blocking key words passing in the web traffic to prevent kids from watching content that might be deemed unsafe using the web management interface. It seems that the device does not implement any cross-site scripting protection mechanism which allows an attacker to trick a user who is logged in to the web management interface into executing a stored cross-site scripting payload on the user's browser and execute any action on the device provided by the web management interface.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html | Third Party Advisory VDB Entry |
https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Securifi_Almond_plus_sec_issues.pdf | Exploit Third Party Advisory |
https://seclists.org/bugtraq/2019/Jun/8 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2019-06-18 21:15
Updated : 2024-02-04 20:20
NVD link : CVE-2017-8332
Mitre link : CVE-2017-8332
CVE.ORG link : CVE-2017-8332
JSON object : View
Products Affected
securifi
- almond_2015_firmware
- almond\+firmware
- almond
- almond_firmware
- almond\+
- almond_2015
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')