[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <FC0ED30B-0CFF-4880-9CFB-4265003D39C8@hackers.it>
Date: Sun, 2 Sep 2012 19:02:47 +0200
From: David3 <netevil@...kers.it>
To: Emilio Pinna <emilio.pinn@...il.com>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: Alice Telecom Italia AGPF ADSL router CSRF
reconfiguration
Ok thanks
Yes with revert the conf I mean you can arbitrary change every param...
Sent from my mobile
Il giorno 02/set/2012, alle ore 18:50, Emilio Pinna <emilio.pinn@...il.com> ha scritto:
> As article said, the router is exploitable via a simple HTTP POST,
> eventually triggerable by CSRF attack.
>
> How do you means with "revert the conf"? With this method you can
> change (and so restore) every single configuration aspect of the
> router.
>
> On Sun, Sep 2, 2012 at 6:47 PM, David3 <netevil@...kers.it> wrote:
>> Ciao Emilio,
>> Is this vulnerability exploitable locally then? My Alice router is not here and I would like to test it...are there any chances to revert the conf from remote with your poc?
>>
>> Thanks!
>> davide
>>
>> Sent from my mobile
>>
>> Il giorno 02/set/2012, alle ore 14:03, Emilio Pinna <emilio.pinn@...il.com> ha scritto:
>>
>>> ################# Alice Telecom Italia AGPF ADSL router CSRF
>>> reconfiguration #################
>>>
>>> ## ABSTRACT
>>>
>>> An huge number of ADSL broadband Italian users are vulnerable to
>>> connection wiretapping and phishing. The most widely distribuited
>>> italian ADSL router Alice Gate 2 Plus Voip Wi-Fi (AGPF), produced by
>>> Pirelli, suffers a CSRF attack that allows an attacker to modify
>>> internal router configuration like DNS servers, traffic routing, VoIP
>>> configurations, DHCP parameters, and and other configurations that may
>>> lead to a complete takeover of the user's ADSL connection. The
>>> technique is also useful to enable hidden feature and
>>> telnet/ftp/tftp/web extended admin interface.
>>>
>>> ## VENDOR: Alice Telecom Italia Modem/Routers manufactered by Pirelli
>>> ## MODEL: AGPF[Alice Gate VoIP 2 Plus Wi-Fi] version < 2.6.0
>>> ## PLATFORM: Customized Linux with openrg middleware on Broadcom
>>> BCM96348 chipset.
>>> ## VULNERABILITY: CSRF and configuration injection via HTTP POST parameter
>>> ## EMAIL: emilio.pinn gmail
>>> ## AUTHOR: Emilio Pinna
>>> ## RISK: high
>>>
>>> More details are published in Dissecting blog:
>>>
>>> Introduction: http://disse.cting.org/2012/09/02/alice-gate-agpf-csrf-reconf-vulnerability/
>>> Technical details:
>>> http://disse.cting.org/2012/09/02/alice-gate-agpf-csrf-reconf-vulnerability-details/
>>> POC: http://disse.cting.org/codes/alice.html
>>>
>>> _______________________________________________
>>> Full-Disclosure - We believe in it.
>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>> Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists