Friendly-Tech FriendlyTR69 CPE Remote Management 2.8.9 – SQL Injection

  • 作者: Yaniv Miron
    日期: 2010-03-10
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11677/
  • =========================================
    Yaniv Miron aka "Lament" Advisory March 7, 2010
    Friendly-Tech FriendlyTR69 CPE Remote Management V2.8.9 SQL Injection Vulnerability
    =========================================
    
    =====================
    I. BACKGROUND
    =====================
    Based on the company’s technical expertise and a decade of hands-on experience
    in the telecom industry, Friendly’s solution is a ROBUST, SCALABLE, SECURED,
    TELCO GRADE and COST-EFFECTIVE TR-069 solution.
    The TR-069 protocol was accepted as the standard for CPE management by the
    DSL, WiMAX, NGN / Optical network providers (some Cable operators are
    deploying TR-069 as well).
    
    Device Management & Auto Provisioning
    
    Friendly’s TR-069 solution delivers comprehensive remote management and
    auto-provisioning of CPEs that support the TR-069 standard - including modem/routers,
    IPTV/ STBs, ATA/VoIP, storage devices, media centers, etc.
    
    http://www.friendly-tech.com/remotemamagment.asp
    
    =====================
    II. DESCRIPTION
    =====================
    
    The Friendly-Tech FriendlyTR69 CPE Remote Management is prone to SQL injection attacks.
    
    =====================
    III. ANALYSIS
    =====================
    
    The vulnerability occurs due to insufficient sanitization of user-supplied data when logging onto the FriendlyTR69 CPE Remote Management.
    
    Successful exploitation may result in an attacker obtaining admin access to the FriendlyTR69 CPE Remote Management.
    
    =====================
    IV. EXPLOIT
    =====================
    
    Username: ' or 1=1--
    Password:' or 1=1--
    
    =====================
    V. DISCLOSURE TIMELINE
    =====================
    
    Jan 2009 Vulnerability Found
    Jan 2009 Vendor Notification
    March 2010 Public Disclosure
    
    =====================
    VI. CREDIT
    =====================
    
    Yaniv Miron aka "Lament".
    lament@ilhack.org