The vulnerable system is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers). An example of a network attack is an attacker causing a denial of service by sending a specially crafted TCP packet across a wide area network (e.g., CVE-2004-0230).
Attack Complexity
Low
AC
The attacker must take no measurable action to exploit the vulnerability. The attack requires no target-specific circumvention to exploit the vulnerability. An attacker can expect repeatable success against the vulnerable system.
Privileges Required
None
PR
The attacker is unauthenticated prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack.
Scope
S
An exploited vulnerability can affect resources beyond the security scope managed by the security authority that is managing the vulnerable component. This is often referred to as a 'privilege escalation,' where the attacker can use the exploited vulnerability to gain control of resources that were not intended or authorized.
Confidentiality
Low
C
There is some impact on confidentiality, but the attacker either does not gain control of any data, or the information obtained does not have a significant impact on the system or its operations.
Integrity
Low
I
Modification of data is possible, but the attacker does not have control over what can be modified, or the extent of what the attacker can affect is limited. The data modified does not have a direct, serious impact on the system.
Availability
None
A
There is no impact on the availability of the system; the attacker does not have the ability to disrupt access to or use of the system.
Peplink NGxxx/LCxxx VPN-Firewall Open RedirectPeplink NGxxx/LCxxx VPN-Firewall Open Redirect Vulnerability
Vendor: Qingdao Xunbo Information Technology Co., Ltd.
Product web page: http://www.peplink.net
Affected version: PEPLINK NG300 VPN-Firewall
PEPLINK NG320-VPN-Firewall
PEPLINK NG500-VPN-Firewall
PEPLINK NG520-VPN-Firewall
PEPLINK LC500-VPN-Firewall
Summary: The NG500 / 520 is a high-performance VPN server, which is suitable
for small and medium enterprises to use as a VPN center. It is simple to deploy
and high security. At the same time, NG500 / 520 products also integrates advanced
firewall features to support access to computers by group, by region, according to
the strategy, according to rules management; support office network and business
network isolation to ensure data server security. At the same time, NG500 / NG520
support intelligent flow control function, can reserve bandwidth for VPN, to ensure
the fluency of critical applications, to prevent network congestion.
The NG300 / 320 products are cost-effective VPN branch gateway products, support to
drive the entire LAN access to the headquarters network to support LAN TO LAN interconnection.
NG300 / 320 integrated online behavior management function, you can achieve P2P, QQ,
MSN and other application control and site filtering and other functions, support QoS
traffic priority control technology, VPN applications can reserve bandwidth to ensure
the stability of remote enterprise data transmission.
Desc: Input passed via the '_redirect' GET parameter via 'service.cgi' script is not
properly verified before being used to redirect users. This can be exploited to redirect
a user to an arbitrary website e.g. when a user clicks a specially crafted link to the
affected script hosted on a trusted domain.
Tested on: nginx/1.2.9
VPN OS 2.6 UTM Base/027R12-newvpn-3.53r
VPNServer/027R12-vpn-b3.74r
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2016-5376
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5376.php
24.09.2016
--
GET /service.cgi?_service=get+session&_redirect=http://zeroscience.mk&_sleep=3 HTTP/1.1
This information is provided for TESTING and LEGAL RESEARCH purposes only. All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum