[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Remote Command Execution on Cisco WAG120N
- To: Gary Driggs <gdriggs@xxxxxxx>
- Subject: Re: [Full-disclosure] Remote Command Execution on Cisco WAG120N
- From: andfarm <andfarm@xxxxxxxxx>
- Date: Tue, 27 Nov 2012 09:33:31 -0800
On 2012-11-22, at 07:08, Gary Driggs <gdriggs@xxxxxxx> wrote:
> How is this a vulnerability if it's behind an authentication wall?
> I've seen several SOHO routers and APs that include some kind of
> "hidden" web page that allows one to tweak settings. How does this
> differ & how is it remotely exploitable without authentication?
Through cross-site request forgery. Consider the following on a publicly
accessible web site:
<form action="http://192.168.0.1/admin.cgi" method="post">
...
</form>
<script>document.forms[0].submit();</script>
(If the form is accessible via GET, the attack becomes even easier, as an
attacker can cause the form to be "submitted" without the involvement of a
script -- by using an <img> tag, for example.)
If the user already has a valid session on the router, the request will
typically go through, unless the router firmware supports some form of XSRF
protection. (Most do not.)
If no session is active, but the router uses HTTP authentication, the browser
will simply pop up an HTTP authentication dialog, and many users will simply
submit the authentication form without realizing what it is that they're
authorizing. (It doesn't help that some browsers may even autofill the username
and/or password on this dialog!)
For routers that make use of non-HTTP login sessions, but which do not use XSRF
protection, and which have default passwords, it may additionally be possible
to "prime" the main attack with an XSRF submission to the login form. There are
ways to ensure that you get the timing of the two submissions right, but I'll
leave them to the reader's imagination. :)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/