[<prev] [next>] [day] [month] [year] [list]
Message-ID: <6c521078-ccde-dfc3-228f-3a0acf184c68@vulnerability-lab.com>
Date: Wed, 11 Jul 2018 14:44:40 +0200
From: Vulnerability Lab <research@...nerability-lab.com>
To: bugtraq@...urityfocus.com, bugs@...uritytracker.com
Subject: Secutech DSL WR RIS 330 - Filter Bypass Vulnerability
Document Title:
===============
Secutech DSL WR RIS 330 - Filter Bypass Vulnerability
References (Source):
====================
https://www.vulnerability-lab.com/get_content.php?id=1988
Release Date:
=============
2018-07-09
Vulnerability Laboratory ID (VL-ID):
====================================
1988
Common Vulnerability Scoring System:
====================================
3.3
Vulnerability Class:
====================
Cross Site Scripting - Persistent
Current Estimated Price:
========================
500€ - 1.000€
Product & Service Introduction:
===============================
The leader in the Venezuelan market, specializing in the development of
safety devices, communication
and networking for companies and households brand. This wireless router
works with a speed up to 300Mbps
are available in red, yellow, orange, blue, green and gray. It has three
5dBi antennas for better coverage.
Supports WEP, WPA and WPA2 also supports WDS to continuously expand its
wireless network. It complies with
IEEE 802.11n/g/b. It works with any browser and its configuration is
fast and easy using any Internet browser.
(Copy of the Homepage: http://www.secutechnology.com/ris-22.html )
Abstract Advisory Information:
==============================
The vulnerability laboratory core research team discovered a filter
bypass vulnerability in the official Secutech DSL Wireless Router RIS
330 web-application.
Vulnerability Disclosure Timeline:
==================================
2018-07-09: Public Disclosure (Vulnerability Laboratory)
Discovery Status:
=================
Published
Affected Product(s):
====================
SecuTech
Product: DSL Router - Wireless RIS 300 5.07.52_es_FRI01
Exploitation Technique:
=======================
Local
Severity Level:
===============
Medium
Authentication Type:
====================
Restricted authentication (user/moderator) - User privileges
User Interaction:
=================
Low User Interaction
Disclosure Type:
================
Independent Security Research
Technical Details & Description:
================================
A filter bypass web vulnerability has been discovered in the official
Secutech DSL Wireless Router RIS 330 web-application.
The filter bypass web vulnerability allows an attacker to evade the
controls of a restriction- or protection mechanism.
The issue allows an attacker to change the wireless passphrase to an
insecure passphrase which is forbidden by the applications
javascript engine & the current measures of minimum WPA Length less than
8 keys. The vulnerability affects the `Secutech DSL Routers`
manufactured by Secutech Inc for communications.
The remote attacker can request to add/edit via POST which changes the
wireless passphrase. Then the attacker changes the followup
parameter `wirelesspassword` to manipulate. The filter won`t allow
authenticated users to set a passphrase less than 8 characters.
The attack results in bypass f the filter and allows the attacker to
setup any passphrase (wpa needs at least 8 chars) without
secure approval. Thus issue can be exploited by automated scripts to
perform attacks against the preeshare mechanism because of
no secure request validation and restriction.
The security risk of the bypass vulnerability is estimated as medium and
the cvss (common vulnerability scoring system) count is 3.3.
Exploitation of the filter bypass vulnerability requires a privileged
web-application user account and medium user interaction.
Successful exploitation of the vulnerability results in unauthorized
access by setting a low secured passphrase key for WPA and WPA2.
Request Method(s):
[+] POST
Vulnerable Module(s):
[+] ./goform/wizardhandle
Vulnerable Parameter(s):
[+] wirelesspassword
Proof of Concept (PoC):
=======================
The filter bypass vulnerability can be exploited by local attacker with
privileged user account and without user interaction.
For security demonstration or to reproduce the vulnerability follow the
provided information and steps below to continue.
Manual steps to reproduce the vulnerability ...
1. Start the router for example in your local lan network
2. Access routers ui interface by usage of the network ip of the router
(exp. 192.168.0.1)
3. Login to the router and access the interface
4. Run a session tamper or any other tool to intercept the http
communication
Setup the javascript filter , and change the wireless password into less
than 8 or even just 1234
5. Process to submit the changes via POST
6. Successfully reproduce the local vulnerability!
Video: https://www.youtube.com/watch?v=6OYaoRsoa0I
--- PoC Session Logs [POST] ---
POST /goform/WizardHandle HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:47.0) Gecko/20100101
Firefox/47.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/index.asp
Cookie: language=en; admin:language=en
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 131
MACC=&GO=advance.asp&v12_time=1477567396.02&WANT1=3&net_type=2&PUN=Lawrence%40connecy.au&PPW=hivulnerable&wirelesspassword=7331
RESPONSE-----
HTTP/1.0 302 Redirect
Server: GoAhead-Webs
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html
Location: http://localhost/notice.asp
<html><head></head><body>
This document has moved to a new <a
href="http://localhost/notice.asp">location</a>.
Please update your documents to reflect the new location.
</body></html>
Solution - Fix & Patch:
=======================
The vulnerability can be patched by a restriction and approval of the
affected key parameter in the POST method request.
Disallow to save any input less then 8 characters to permanently grant
the security of the customer using the mentioned hardware.
Security Risk:
==============
The security risk of the filter bypass router vulnerability in the
password setup module is estimated as medium (CVSS 3.3).
Credits & Authors:
==================
Lawrence Amer (Vulnerability Lab Core Research Team)
[zeroattck@...il.com] -
https://www.vulnerability-lab.com/show.php?user=Lawrence+Amer
Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without
any warranty. Vulnerability Lab disclaims all warranties, either
expressed or
implied, including the warranties of merchantability and capability for
a particular purpose. Vulnerability-Lab or its suppliers are not liable
in any
case of damage, including direct, indirect, incidental, consequential
loss of business profits or special damages, even if Vulnerability Labs
or its
suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability mainly for
incidental
or consequential damages so the foregoing limitation may not apply. We
do not approve or encourage anybody to break any licenses, policies, deface
websites, hack into databases or trade with stolen data. We have no need
for criminal activities or membership requests. We do not publish
advisories
or vulnerabilities of religious-, militant- and racist-
hacker/analyst/researcher groups or individuals. We do not publish trade
researcher mails,
phone numbers, conversations or anything else to journalists,
investigative authorities or private individuals.
Domains: www.vulnerability-lab.com - www.vulnerability-db.com -
www.evolution-sec.com
Programs: vulnerability-lab.com/submit.php -
vulnerability-lab.com/list-of-bug-bounty-programs.php -
vulnerability-lab.com/register.php
Feeds: vulnerability-lab.com/rss/rss.php -
vulnerability-lab.com/rss/rss_upcoming.php -
vulnerability-lab.com/rss/rss_news.php
Social: twitter.com/vuln_lab - facebook.com/VulnerabilityLab -
youtube.com/user/vulnerability0lab
Any modified copy or reproduction, including partially usages, of this
file, resources or information requires authorization from Vulnerability
Laboratory.
Permission to electronically redistribute this alert in its unmodified
form is granted. All other rights, including the use of other media, are
reserved by
Vulnerability Lab Research Team or its suppliers. All pictures, texts,
advisories, source code, videos and other information on this website is
trademark
of vulnerability-lab team & the specific authors or managers. To record,
list, modify, use or edit our material contact (admin@) to get an ask
permission.
Copyright © 2018 | Vulnerability Laboratory - [Evolution
Security GmbH]™
--
VULNERABILITY LABORATORY - RESEARCH TEAM
SERVICE: www.vulnerability-lab.com
Powered by blists - more mailing lists