lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 19 Jan 2016 08:42:34 -0600
From: David Longenecker <david@...urityforrealpeople.com>
To: fulldisclosure@...lists.org
Subject: [FD] Administrator auto-logout design flaw in ASUS wireless routers

ASUS wireless routers have an optional feature (beginning with firmware
3.0.0.4.374_5656, dated April 2014) to log the administrator out after a
period of idle time. While there are scenarios where you might want to keep
an idle logged-in session, remaining logged in makes it possible for a
malicious hacker to use that session by tricking the user into clicking a
link.

Models based on the ASUSWRT firmware up to and including the most recent
version as of this writing - version 3.0.0.4.378_9460 (dated 2015-12-29) -
rely on the browser to enforce the auto-logout function. The
firmware implements the administrator auto-logout function via JavaScript
in the browser.

A code review demonstrating exactly how this is implemented is posted at
http://www.securityforrealpeople.com/2016/01/administrator-logout-flaw-in-asus.html

Ultimately this places control of the auto-logout in the hands of the
client (either the web browser or the person) instead of it being
controlled by the server, defeating the purpose of an auto-logout
feature. It's an improvement over not having the feature at all, but better
still would be to have the time kept by the router, and have the router log
the admin account off after the selected time has elapsed, instead of
relying on the client.

If the user has disabled JavaScript, this function is never triggered.
Users not in the habit of explicitly logging out of websites may simply
close the web UI window, expecting the router to automatically terminate
the session after a set time. In both cases, an administrative session
remains open on the router without the operator's knowledge.

Lack of an auto-logout function itself is not necessarily a security flaw,
but In my opinion an improperly implemented auto-logout feature is a
security risk, in that the a security control the operator has enabled does
not function as expected.

This line of firmware is used on most modern ASUS wireless routers; I
specifically have tested the RT-AC87U and RT-AC66U, but the same code base
is used across many other models in the RT-XXXX line.

This was first reported to ASUS on December 13, 2014. It was acknowledged
but never changed.

Details are at
http://www.securityforrealpeople.com/2016/01/administrator-logout-flaw-in-asus.html,
and any updates will be appended.

Regards,
David Longenecker

Connect: Blog <http://securityforrealpeople.com/> | @dnlongen
<https://www.twitter.com/dnlongen> | LinkedIn
<https://www.linkedin.com/in/dnlongen/>
PGP key: https://keybase.io/dnlongen

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ