[<prev] [next>] [day] [month] [year] [list]
Message-ID: <004f01d0fa30$2e744390$9b7a6fd5@pc>
Date: Mon, 28 Sep 2015 23:56:17 +0300
From: "MustLive" <mustlive@...security.com.ua>
To: <submissions@...ketstormsecurity.org>,
<fulldisclosure@...lists.org>
Subject: [FD] Vulnerabilities in Callisto 821+R3 ADSL Router
Hello list!
In 2011 I wrote 22 advisories about vulnerabilities in Callisto 821+ ADSL
Router (http://seclists.org/fulldisclosure/2011/Aug/1). Because vendor
ignored in 2011 all my letters and subsequent my public disclosure of
vulnerabilities and new devices are vulnerable as well, so in August I
disclosed vulnerabilities in Callisto 821+R3 ADSL Router.
These are Brute Force and Cross-Site Request Forgery vulnerabilities. And
there are many other vulnerabilities (in control panel).
SecurityVulns ID: 11700.
-------------------------
Affected products:
-------------------------
Vulnerable is the next model: Callisto 821+R3, Firmware Version: ZXDSL
831IIV7.5.1a_E09_UA. This model with other firmware and also other models of
Callisto also must be vulnerable.
----------
Details:
----------
Similar Predictable Resource Location, BF and CSRF vulnerabilities, as in
Callisto 821+ and other network devices of this and other vendors. The
control panel of router is placed at default path with default login and
password. Which allows for local users (which have access to PC or via LAN)
and also for remote users via Internet (via CSRF vulnerabilities or if
remote access is opened) to get access to control panel and change modem's
settings. This also will be in handy for conducting of remote login attack.
Brute Force (WASC-11):
In login form http://192.168.1.1 there is no protection against Brute Force
attacks. Which allows to pick up password (if it was changed from default),
as at local attack, as at attack via Internet (if remote access is opened).
Cross-Site Request Forgery (WASC-09):
Lack of protection against Brute Force (such as captcha) also leads to
possibility of conducting of CSRF attacks, which I wrote about in the
article Attacks on unprotected login forms
(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2011-April/007773.html).
It allows to conduct remote login. Which will be in handy at conducting of
attacks on different CSRF and XSS vulnerabilities in control panel.
Note, that CSRF attack on html-form for remote login is possible only when
settings of ADSL router are not changed. Because after changes instead of
html-form for authentication the Basic Authentication is used. Then it's
needed to use method of CSRF attack on Basic Authentication, when the remote
login will occur without showing of dialog window.
Callisto 821+R3 CSRF.html
<img src="http://admin:admin@....168.1.1">
<img src="http://admin:admin@...t">
I mentioned about these vulnerabilities at my site
(http://websecurity.com.ua/7916/).
Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists