Headline
CVE-2020-23593: GitHub - huzaifahussain98/CVE-2020-23593: INFORMATION DISCLOSURE :CSRF to enable syslog mode and send to remote syslog server IP and Port.
A vulnerability in OPTILINK OP-XT71000N Hardware Version: V2.2, Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross site request forgery (CSRF) attack to enable syslog mode through ' /mgm_log_cfg.asp.’ The system starts to log events, ‘Remote’ mode or ‘Both’ mode on “Syslog – Configuration page” logs events and sends to remote syslog server IP and Port.
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
1 branch 0 tags
Code
Use Git or checkout with SVN using the web URL.
Open with GitHub Desktop
Download ZIP
Latest commit
FilesPermalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
CVE-2020-23593
OPTILINK E-PON “MODEL NO: OP-XT71000N” with "HARDWARE VERSION: V2.2"; & “FIRMWARE VERSION: OP_V3.3.1-191028”
Found vulnerability in the “OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028” allow an unauthenticated, remote attacker to conduct a cross site request forgery (CSRF) attack to enable syslog mode through ' /mgm_log_cfg.asp '. system starts to log events, ‘Remote’ mode or ‘Both’ mode on “Syslog – Configuration page” logs events and sends to remote syslog server IP and Port.
TARGET
/mgm_log_cfg.asp
Attack Vector
CSRF attack to enable syslog mode through ' /mgm_log_cfg.asp ' and sends to remote syslog server IP and Port.
REGARDS
Huzaifa Hussain
https://twitter.com/disguised_noob
https://www.linkedin.com/in/huzaifa-hussain-046791179