[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Friendly-Tech FriendlyTR69 CPE Remote Management V2.8.9 SQL Injection Vulnerability
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: Friendly-Tech FriendlyTR69 CPE Remote Management V2.8.9 SQL Injection Vulnerability
- From: lament@xxxxxxxxxx
- Date: 10 Mar 2010 00:52:17 -0000
=========================================
Yaniv Miron aka "Lament" Advisory March 7, 2010
Friendly-Tech FriendlyTR69 CPE Remote Management V2.8.9 SQL Injection
Vulnerability
=========================================
=====================
I. BACKGROUND
=====================
Based on the company?s technical expertise and a decade of hands-on experience
in the telecom industry, Friendly?s solution is a ROBUST, SCALABLE, SECURED,
TELCO GRADE and COST-EFFECTIVE TR-069 solution.
The TR-069 protocol was accepted as the standard for CPE management by the
DSL, WiMAX, NGN / Optical network providers (some Cable operators are
deploying TR-069 as well).
Device Management & Auto Provisioning
Friendly?s TR-069 solution delivers comprehensive remote management and
auto-provisioning of CPEs that support the TR-069 standard - including
modem/routers,
IPTV/ STBs, ATA/VoIP, storage devices, media centers, etc.
http://www.friendly-tech.com/remotemamagment.asp
=====================
II. DESCRIPTION
=====================
The Friendly-Tech FriendlyTR69 CPE Remote Management is prone to SQL injection
attacks.
=====================
III. ANALYSIS
=====================
The vulnerability occurs due to insufficient sanitization of user-supplied data
when logging onto the FriendlyTR69 CPE Remote Management.
Successful exploitation may result in an attacker obtaining admin access to the
FriendlyTR69 CPE Remote Management.
=====================
IV. EXPLOIT
=====================
Username: ' or 1=1--
Password: ' or 1=1--
=====================
V. DISCLOSURE TIMELINE
=====================
Jan 2009 Vulnerability Found
Jan 2009 Vendor Notification
March 2010 Public Disclosure
=====================
VI. CREDIT
=====================
Yaniv Miron aka "Lament".
lament@xxxxxxxxxx