lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 2 Sep 2012 19:02:47 +0200
From: David3 <netevil@...kers.it>
To: Emilio Pinna <emilio.pinn@...il.com>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: Alice Telecom Italia AGPF ADSL router CSRF
	reconfiguration

Ok thanks
Yes with revert the conf I mean you can arbitrary change every param...

Sent from my mobile 

Il giorno 02/set/2012, alle ore 18:50, Emilio Pinna <emilio.pinn@...il.com> ha scritto:

> As article said, the router is exploitable via a simple HTTP POST,
> eventually triggerable by CSRF attack.
> 
> How do you means with "revert the conf"? With this method you can
> change (and so restore) every single configuration aspect of the
> router.
> 
> On Sun, Sep 2, 2012 at 6:47 PM, David3 <netevil@...kers.it> wrote:
>> Ciao Emilio,
>> Is this vulnerability exploitable locally then? My Alice router is not here and I would like to test it...are there any chances to revert the conf from remote with your poc?
>> 
>> Thanks!
>> davide
>> 
>> Sent from my mobile
>> 
>> Il giorno 02/set/2012, alle ore 14:03, Emilio Pinna <emilio.pinn@...il.com> ha scritto:
>> 
>>> ################# Alice Telecom Italia AGPF ADSL router CSRF
>>> reconfiguration #################
>>> 
>>> ## ABSTRACT
>>> 
>>> An huge number of ADSL broadband Italian users are vulnerable to
>>> connection wiretapping and phishing. The most widely distribuited
>>> italian ADSL router Alice Gate 2 Plus Voip Wi-Fi (AGPF), produced by
>>> Pirelli, suffers a CSRF attack that allows an attacker to modify
>>> internal router configuration like DNS servers, traffic routing, VoIP
>>> configurations, DHCP parameters, and and other configurations that may
>>> lead to a complete takeover of the user's ADSL connection. The
>>> technique is also useful to enable hidden feature and
>>> telnet/ftp/tftp/web extended admin interface.
>>> 
>>> ## VENDOR: Alice Telecom Italia Modem/Routers manufactered by Pirelli
>>> ## MODEL: AGPF[Alice Gate VoIP 2 Plus Wi-Fi] version < 2.6.0
>>> ## PLATFORM: Customized Linux with openrg middleware on Broadcom
>>> BCM96348 chipset.
>>> ## VULNERABILITY: CSRF and configuration injection via HTTP POST parameter
>>> ## EMAIL: emilio.pinn gmail
>>> ## AUTHOR: Emilio Pinna
>>> ## RISK: high
>>> 
>>> More details are published in Dissecting blog:
>>> 
>>> Introduction: http://disse.cting.org/2012/09/02/alice-gate-agpf-csrf-reconf-vulnerability/
>>> Technical details:
>>> http://disse.cting.org/2012/09/02/alice-gate-agpf-csrf-reconf-vulnerability-details/
>>> POC: http://disse.cting.org/codes/alice.html
>>> 
>>> _______________________________________________
>>> Full-Disclosure - We believe in it.
>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>> Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ