Short Name |
HTTP:STC:ALINK-WIRLES-RUTR-CSRF |
---|---|
Severity |
Medium |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
A-Link Wireless Router Cross Site Request Forgery |
Release Date |
2012/12/12 |
Update Number |
2210 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against A-Link Wireless Router web interface. A successful attack can lead to cross-site request forgery attacks and unauthorized session hijack.
A-Link WL54AP3 and WL54AP2 are prone to a cross-site request-forgery vulnerability and an HTML-injection vulnerability. An attacker can exploit the cross-site request-forgery issue to alter the administrative configuration on affected devices. This may lead to further network-based attacks. The attacker can exploit the HTML-injection issue to execute arbitrary script code in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.