Secutech DSL WR RIS 330 - Filter Bypass Vulnerability

2018.07.11
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

Document Title: =============== Secutech DSL WR RIS 330 - Filter Bypass Vulnerability References (Source): ==================== https://www.vulnerability-lab.com/get_content.php?id=1988 Release Date: ============= 2018-07-09 Vulnerability Laboratory ID (VL-ID): ==================================== 1988 Common Vulnerability Scoring System: ==================================== 3.3 Vulnerability Class: ==================== Cross Site Scripting - Persistent Current Estimated Price: ======================== 500€ - 1.000€ Product & Service Introduction: =============================== The leader in the Venezuelan market, specializing in the development of safety devices, communication and networking for companies and households brand. This wireless router works with a speed up to 300Mbps are available in red, yellow, orange, blue, green and gray. It has three 5dBi antennas for better coverage. Supports WEP, WPA and WPA2 also supports WDS to continuously expand its wireless network. It complies with IEEE 802.11n/g/b. It works with any browser and its configuration is fast and easy using any Internet browser. (Copy of the Homepage: http://www.secutechnology.com/ris-22.html ) Abstract Advisory Information: ============================== The vulnerability laboratory core research team discovered a filter bypass vulnerability in the official Secutech DSL Wireless Router RIS 330 web-application. Vulnerability Disclosure Timeline: ================================== 2018-07-09: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== SecuTech Product: DSL Router - Wireless RIS 300 5.07.52_es_FRI01 Exploitation Technique: ======================= Local Severity Level: =============== Medium Authentication Type: ==================== Restricted authentication (user/moderator) - User privileges User Interaction: ================= Low User Interaction Disclosure Type: ================ Independent Security Research Technical Details & Description: ================================ A filter bypass web vulnerability has been discovered in the official Secutech DSL Wireless Router RIS 330 web-application. The filter bypass web vulnerability allows an attacker to evade the controls of a restriction- or protection mechanism. The issue allows an attacker to change the wireless passphrase to an insecure passphrase which is forbidden by the applications javascript engine & the current measures of minimum WPA Length less than 8 keys. The vulnerability affects the `Secutech DSL Routers` manufactured by Secutech Inc for communications. The remote attacker can request to add/edit via POST which changes the wireless passphrase. Then the attacker changes the followup parameter `wirelesspassword` to manipulate. The filter won`t allow authenticated users to set a passphrase less than 8 characters. The attack results in bypass f the filter and allows the attacker to setup any passphrase (wpa needs at least 8 chars) without secure approval. Thus issue can be exploited by automated scripts to perform attacks against the preeshare mechanism because of no secure request validation and restriction. The security risk of the bypass vulnerability is estimated as medium and the cvss (common vulnerability scoring system) count is 3.3. Exploitation of the filter bypass vulnerability requires a privileged web-application user account and medium user interaction. Successful exploitation of the vulnerability results in unauthorized access by setting a low secured passphrase key for WPA and WPA2. Request Method(s): [+] POST Vulnerable Module(s): [+] ./goform/wizardhandle Vulnerable Parameter(s): [+] wirelesspassword Proof of Concept (PoC): ======================= The filter bypass vulnerability can be exploited by local attacker with privileged user account and without user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Start the router for example in your local lan network 2. Access routers ui interface by usage of the network ip of the router (exp. 192.168.0.1) 3. Login to the router and access the interface 4. Run a session tamper or any other tool to intercept the http communication Setup the javascript filter , and change the wireless password into less than 8 or even just 1234 5. Process to submit the changes via POST 6. Successfully reproduce the local vulnerability! Video: https://www.youtube.com/watch?v=6OYaoRsoa0I --- PoC Session Logs [POST] --- POST /goform/WizardHandle HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (X11; Linux i686; rv:47.0) Gecko/20100101 Firefox/47.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://localhost/index.asp Cookie: language=en; admin:language=en Connection: keep-alive Content-Type: application/x-www-form-urlencoded Content-Length: 131 MACC=&GO=advance.asp&v12_time=1477567396.02&WANT1=3&net_type=2&PUN=Lawrence%40connecy.au&PPW=hivulnerable&wirelesspassword=7331 RESPONSE----- HTTP/1.0 302 Redirect Server: GoAhead-Webs Pragma: no-cache Cache-Control: no-cache Content-Type: text/html Location: http://localhost/notice.asp <html><head></head><body> This document has moved to a new <a href="http://localhost/notice.asp">location</a>. Please update your documents to reflect the new location. </body></html> Solution - Fix & Patch: ======================= The vulnerability can be patched by a restriction and approval of the affected key parameter in the POST method request. Disallow to save any input less then 8 characters to permanently grant the security of the customer using the mentioned hardware. Security Risk: ============== The security risk of the filter bypass router vulnerability in the password setup module is estimated as medium (CVSS 3.3). Credits & Authors: ================== Lawrence Amer (Vulnerability Lab Core Research Team) [zeroattck@gmail.com] - https://www.vulnerability-lab.com/show.php?user=Lawrence+Amer Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability Labs or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability mainly for incidental or consequential damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data. We have no need for criminal activities or membership requests. We do not publish advisories or vulnerabilities of religious-, militant- and racist- hacker/analyst/researcher groups or individuals. We do not publish trade researcher mails, phone numbers, conversations or anything else to journalists, investigative authorities or private individuals. Domains: www.vulnerability-lab.com - www.vulnerability-db.com - www.evolution-sec.com Programs: vulnerability-lab.com/submit.php - vulnerability-lab.com/list-of-bug-bounty-programs.php - vulnerability-lab.com/register.php Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php Social: twitter.com/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab Any modified copy or reproduction, including partially usages, of this file, resources or information requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or edit our material contact (admin@) to get an ask permission. Copyright © 2018 | Vulnerability Laboratory - [Evolution Security GmbH]™

References:

https://www.vulnerability-lab.com/get_content.php?id=1988


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top