Ksenia Security Lares 4.0 Home Automation URL Redirection
Ksenia Security Lares 4.0存在URL重定向漏洞,攻击者可通过`redirectPage`参数将用户重定向至恶意网站。 2025-4-1 19:58:28 Author: cxsecurity.com(查看原文) 阅读量:20 收藏

# Exploit Title: Ksenia Security Lares 4.0 Home Automation URL Redirection # Google Dork: N/A # Date: 31 March 2025 # Exploit Author: Mencha 'ShadeLock' Isajlovska # Vendor Homepage: https://www.kseniasecurity.com/en/ # Software Link: https://www.kseniasecurity.com/en/company/why-lares-4-0.html # Version: Lares 4.0 # Tested on: Ksenia Lares Webserver # CVE : N/A # Desc: Input passed via the 'redirectPage' GET parameter in 'cmdOk.xml' script is not properly verified before being used to redirect users. This can be exploited to redirect an authenticating user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain. http://192.168.1.2/xml/cmd/cmdOk.xml?cmd=setMacro&pin=123456&macroId=2&redirectPage=//zeroscience.mk


文章来源: https://cxsecurity.com/issue/WLB-2025040005
如有侵权请联系:admin#unsafe.sh