The vulnerable system is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers). An example of a network attack is an attacker causing a denial of service by sending a specially crafted TCP packet across a wide area network (e.g., CVE-2004-0230).
Attack Complexity
High
AC
The successful attack depends on the evasion or circumvention of security-enhancing techniques in place that would otherwise hinder the attack. These include: Evasion of exploit mitigation techniques. The attacker must have additional methods available to bypass security measures in place. For example, circumvention of address space randomization (ASLR) or data execution prevention must be performed for the attack to be successful. Obtaining target-specific secrets. The attacker must gather some target-specific secret before the attack can be successful. A secret is any piece of information that cannot be obtained through any amount of reconnaissance. To obtain the secret the attacker must perform additional attacks or break otherwise secure measures (e.g. knowledge of a secret key may be needed to break a crypto channel). This operation must be performed for each attacked target.
Privileges Required
None
PR
The attacker is unauthenticated prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack.
User Interaction
None
UI
The vulnerable system can be exploited without interaction from any human user, other than the attacker. Examples include: a remote attacker is able to send packets to a target system a locally authenticated attacker executes code to elevate privileges
Scope
Unchanged
S
An exploited vulnerability can only affect resources managed by the same security authority. In the case of a vulnerability in a virtualized environment, an exploited vulnerability in one guest instance would not affect neighboring guest instances.
Confidentiality
High
C
There is total information disclosure, resulting in all data on the system being revealed to the attacker, or there is a possibility of the attacker gaining control over confidential data.
Integrity
None
I
There is no impact on the integrity of the system; the attacker does not gain the ability to modify any files or information on the target system.
Availability
None
A
There is no impact on the availability of the system; the attacker does not have the ability to disrupt access to or use of the system.
Below is a copy: Secutech DSL WR RIS 330 - Filter Bypass Vulnerability
Document Title:
===============
Secutech DSL WR RIS 330 - Filter Bypass Vulnerability
References (Source):
====================
https://www.vulnerability-lab.com/get_content.php?id=1988
Release Date:
=============
2018-07-09
Vulnerability Laboratory ID (VL-ID):
====================================
1988
Common Vulnerability Scoring System:
====================================
3.3
Vulnerability Class:
====================
Cross Site Scripting - Persistent
Current Estimated Price:
========================
500 - 1.000
Product & Service Introduction:
===============================
The leader in the Venezuelan market, specializing in the development of
safety devices, communication
and networking for companies and households brand. This wireless router
works with a speed up to 300Mbps
are available in red, yellow, orange, blue, green and gray. It has three
5dBi antennas for better coverage.
Supports WEP, WPA and WPA2 also supports WDS to continuously expand its
wireless network. It complies with
IEEE 802.11n/g/b. It works with any browser and its configuration is
fast and easy using any Internet browser.
(Copy of the Homepage: http://www.secutechnology.com/ris-22.html )
Abstract Advisory Information:
==============================
The vulnerability laboratory core research team discovered a filter
bypass vulnerability in the official Secutech DSL Wireless Router RIS
330 web-application.
Vulnerability Disclosure Timeline:
==================================
2018-07-09: Public Disclosure (Vulnerability Laboratory)
Discovery Status:
=================
Published
Affected Product(s):
====================
SecuTech
Product: DSL Router - Wireless RIS 300 5.07.52_es_FRI01
Exploitation Technique:
=======================
Local
Severity Level:
===============
Medium
Authentication Type:
====================
Restricted authentication (user/moderator) - User privileges
User Interaction:
=================
Low User Interaction
Disclosure Type:
================
Independent Security Research
Technical Details & Description:
================================
A filter bypass web vulnerability has been discovered in the official
Secutech DSL Wireless Router RIS 330 web-application.
The filter bypass web vulnerability allows an attacker to evade the
controls of a restriction- or protection mechanism.
The issue allows an attacker to change the wireless passphrase to an
insecure passphrase which is forbidden by the applications
javascript engine & the current measures of minimum WPA Length less than
8 keys. The vulnerability affects the `Secutech DSL Routers`
manufactured by Secutech Inc for communications.
The remote attacker can request to add/edit via POST which changes the
wireless passphrase. Then the attacker changes the followup
parameter `wirelesspassword` to manipulate. The filter won`t allow
authenticated users to set a passphrase less than 8 characters.
The attack results in bypass f the filter and allows the attacker to
setup any passphrase (wpa needs at least 8 chars) without
secure approval. Thus issue can be exploited by automated scripts to
perform attacks against the preeshare mechanism because of
no secure request validation and restriction.
The security risk of the bypass vulnerability is estimated as medium and
the cvss (common vulnerability scoring system) count is 3.3.
Exploitation of the filter bypass vulnerability requires a privileged
web-application user account and medium user interaction.
Successful exploitation of the vulnerability results in unauthorized
access by setting a low secured passphrase key for WPA and WPA2.
Request Method(s):
[+] POST
Vulnerable Module(s):
[+] ./goform/wizardhandle
Vulnerable Parameter(s):
[+] wirelesspassword
Proof of Concept (PoC):
=======================
The filter bypass vulnerability can be exploited by local attacker with
privileged user account and without user interaction.
For security demonstration or to reproduce the vulnerability follow the
provided information and steps below to continue.
Manual steps to reproduce the vulnerability ...
1. Start the router for example in your local lan network
2. Access routers ui interface by usage of the network ip of the router
(exp. 192.168.0.1)
3. Login to the router and access the interface
4. Run a session tamper or any other tool to intercept the http
communication
Setup the javascript filter , and change the wireless password into less
than 8 or even just 1234
5. Process to submit the changes via POST
6. Successfully reproduce the local vulnerability!
Video: https://www.youtube.com/watch?v=6OYaoRsoa0I
--- PoC Session Logs [POST] ---
POST /goform/WizardHandle HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:47.0) Gecko/20100101
Firefox/47.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/index.asp
Cookie: language=en; admin:language=en
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 131
MACC=&GO=advance.asp&v12_time=1477567396.02&WANT1=3&net_type=2&PUN=Lawrence%40connecy.au&PPW=hivulnerable&wirelesspassword=7331
RESPONSE-----
HTTP/1.0 302 Redirect
Server: GoAhead-Webs
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html
Location: http://localhost/notice.asp
<html><head></head><body>
This document has moved to a new <a
href="http://localhost/notice.asp">location</a>.
Please update your documents to reflect the new location.
</body></html>
Solution - Fix & Patch:
=======================
The vulnerability can be patched by a restriction and approval of the
affected key parameter in the POST method request.
Disallow to save any input less then 8 characters to permanently grant
the security of the customer using the mentioned hardware.
Security Risk:
==============
The security risk of the filter bypass router vulnerability in the
password setup module is estimated as medium (CVSS 3.3).
Credits & Authors:
==================
Lawrence Amer (Vulnerability Lab Core Research Team)
[[email protected]] -
https://www.vulnerability-lab.com/show.php?user=Lawrence+Amer
Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without
any warranty. Vulnerability Lab disclaims all warranties, either
expressed or
implied, including the warranties of merchantability and capability for
a particular purpose. Vulnerability-Lab or its suppliers are not liable
in any
case of damage, including direct, indirect, incidental, consequential
loss of business profits or special damages, even if Vulnerability Labs
or its
suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability mainly for
incidental
or consequential damages so the foregoing limitation may not apply. We
do not approve or encourage anybody to break any licenses, policies, deface
websites, hack into databases or trade with stolen data. We have no need
for criminal activities or membership requests. We do not publish
advisories
or vulnerabilities of religious-, militant- and racist-
hacker/analyst/researcher groups or individuals. We do not publish trade
researcher mails,
phone numbers, conversations or anything else to journalists,
investigative authorities or private individuals.
Domains: www.vulnerability-lab.com - www.vulnerability-db.com -
www.evolution-sec.com
Programs: vulnerability-lab.com/submit.php -
vulnerability-lab.com/list-of-bug-bounty-programs.php -
vulnerability-lab.com/register.php
Feeds: vulnerability-lab.com/rss/rss.php -
vulnerability-lab.com/rss/rss_upcoming.php -
vulnerability-lab.com/rss/rss_news.php
Social: twitter.com/vuln_lab - facebook.com/VulnerabilityLab -
youtube.com/user/vulnerability0lab
Any modified copy or reproduction, including partially usages, of this file, resources or information requires authorization from Vulnerability Laboratory.
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by
Vulnerability Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is
trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or edit our material contact (admin@) to get an ask permission.
Copyright 2018 | Vulnerability Laboratory - [Evolution Security GmbH]
This information is provided for TESTING and LEGAL RESEARCH purposes only. All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum