Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Samsung Syncthru Web Service XSS And CSRF Vulnerabilities
Information
Severity
Severity
Medium
Family
Family
Web application abuses
CVSSv2 Base
CVSSv2 Base
6.8
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:M/Au:N/C:P/I:P/A:P
Solution Type
Solution Type
None Solution Available
Created
Created
5 years ago
Modified
Modified
5 years ago
Summary
The host is running Samsung Syncthru Web Service and is prone to cross-site scripting and cross-site request forgery vulnerabilities.
Insight
Insight
Multiple flaws exist due to, - Improper sanitization of user input data like via 'ruiFw_pid' parameter. - Lack of protection against CSRF attacks.
Affected Software
Affected Software
Samsung Syncthru Web Service
Detection Method
Detection Method
Send a crafted HTTP GET request and check whether it is possible to read a cookie or not.
Solution
Solution
No known solution is available as of 26th February, 2019. Information regarding this issue will be updated once solution details are available.