Ruckus Wireless Zoneflex 2942 Wireless Access Point – Authentication Bypass

  • 作者: myexploit
    日期: 2013-11-19
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/29709/
  • Exploit Title: Ruckus Wireless Zoneflex 2942 Wireless Access Point vulnerable to authentication bypass
    Date: 10/10/2013
    Exploit Author: myexploit
    Vendor Homepage: http://www.ruckuswireless.com/
    Version: 2942 Wireless Access Point version 9.6.0.0.267
    CVE : CVE-2013-5030
    
    Video to show the exploit
    
    http://www.youtube.com/watch?v=KAAQZZs4_n4
    
    Overview
    
    Ruckus Wireless Zoneflex 2942 Wireless Access Point version 9.6.0.0.267 and possibly earlier versions contains an authentication bypass vulnerability (CWE-592).
    Description
    
    CWE-592: Authentication Bypass Issues
    
    Ruckus Wireless Zoneflex 2942 Wireless Access Point version 9.6.0.0.267 contains an authentication bypass vulnerability. A local unauthenticated attacker may attempt to login with any credentials and after receiving the authentication failure message, the user can remove the /login.asp portion of the URI to bypass the login page. The attacker will not be able to browse to the other configuration pages of the device via the graphical user interface, but they can then manually edit the URI to gain access to the following pages:
    /configuration/wireless.asp
    /configuration/local_network.asp
    /configuration/internet.asp
    /configuration/device.asp
    /maintenance/upgrade.asp
    /maintenance/reboot.asp
    Impact
    
    An unauthenticated attacker may be able to directly access the device's configuration web pages. The attacker may also be able to reboot the access point, resulting in a denial of service.
    Solution
    
    We are currently unaware of a practical solution to this problem. Please consider the following workarounds.