Hello,
I have found on my router, a Linksys X2000, that there is a poor
validation of the IP target in the ping diagnostics web page
(http://$router_ip/Diagnostics.asp). This can be used to execute
arbitrary commands as the root user on the device. It appears that there
is no need for authentication to exploit the flaw, so this is
exploitable from WAN if the administrator has activated remote
management from the web UI.
It was discovered that the web-based administration interface in the
Horde Application Framework did not guard against Cross-Site Request
Forgery (CSRF) attacks. As a result, other, malicious web pages could
cause Horde applications to perform actions as the Horde user.
Server-side request forgery (SSRF) vulnerability in the proxy endpoint (api/v1/proxy) in Apache Ambari before 2.1.0 allows remote authenticated users to conduct port scans and access unsecured services via a crafted REST call.
Cross-site scripting (XSS) vulnerability in Apache Ambari before 2.1.0 allows remote authenticated cluster operator users to inject arbitrary web script or HTML via the note field in a configuration change.
Apache Ambari before 2.0.2 or 2.1.x before 2.1.1 allows remote authenticated users to gain administrative privileges via unspecified vectors, possibly related to changing passwords.