exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ASUS RT-AC68U Cross Site Scripting

ASUS RT-AC68U Cross Site Scripting
Posted Apr 4, 2014
Authored by Joaquim Brasil de Oliveira

ASUS RT-AC68U web management interface suffers from a reflective cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 7ba8e8486a3d4055ad7a78d96b2f3cb20a29f14fd45f7d1245bd8fc10e936f97

ASUS RT-AC68U Cross Site Scripting

Change Mirror Download
=====[Alligator Security Team - Security Advisory]============================

Reflected Cross-Site Scripting within the ASUS RT-AC68U Managing Web Interface

Author: Joaquim Brasil de Oliveira < palulabrasil () gmail com >
< twitter.com/palulabr >

=====[Table of Contents]======================================================

1. Overview
2. Detailed description
3. Other contexts & solutions
4. Timeline
5. References

=====[1. Overview]============================================================

* Systems affected: ASUS RT-AC68U web interface - 3.0.0.4.374.4755 (verified)
- 3.0.0.4.374_4887 (verified)
- 3.0.0.4.374_4983 (verified)
(other versions may be affected)

* Release date: 04/04/2014
* Impact: This vulnerability allows for performing attacks against third party
users of the ASUS RT-AC68U web management platform, by luring them
into clicking on a link provided with malicious content, which in
turn, will execute on the context of the victim's browser.

The ASUS RT-AC68U is the world's fastest Wi-Fi router, with combined dual-band
data rates of up to 1900 Mbps. 1300 Mbps 802.11ac at 5 GHz gives Gigabit
wireless data rates, while Broadcom(R) TurboQAM(tm) technology super-charges 2.4 Ghz
802.11n performance from 450 Mbps to 600 Mbps with compatible devices[1].

=====[2. Detailed description]================================================

The ASUS RT-AC68U router has a web interface management tool designed to
graphically assist users in configuring various features and/or diagnosing
problems. However, there is a bug with the "Wireless" tab of this web management
interface that results in the possibility for an attacker to execute malicious
content within another user's browser by luring this given user (victim) into
visiting a specially crafted link.

Furthermore, in order to exploit this bug, the attacker needs to send the
following malicious link to the victim --- e.g: the router administrator:

https://[router's IP
address]/apply.cgi?next_page=Advanced_Wireless_Content.asp&current_page="><script>alert('XSS')</script><"&action_mode=change_wl_unit

When the victim clicks on the aforementioned link, because of the fact that the
"current_page" parameter is susceptible to refelected cross-site scripting
attacks, the malicious code stated in the given parameter will be executed ---
in this specific proof of concept, the code will trigger an alert box --- within
the victim's browser context.

This bug occurs because ASUS web management interface poorly validates data
output. Therefore, given the fact that HTML/Javascript code is interpreted by
browsers, the malicious code supplied by the attacker will be rendered in the
victim's browser.

It is important to mention that even if the victim is not logged in, whenever an
attacker sends the malicious link to her, the web management platform will
provide the authentication interface, and after that, redirect the victim to the
malicious target. So in order to exploit this vulnerability, the only
information the attacker needs to know, is a valid user within the system (e.g:
the router's administrator).

=====[3. Other contexts & solutions]==========================================

In order to erradicate this problem, it is imperative that the the server
enforces data output validation.

An additional measure regards filtering data input. Therefore, by applying both
these measures, all data input provided by third parties will be validated and
all data being ouputted by the server will also be validated.

=====[4. Timeline]============================================================

03/31/2014 - ASUS was contacted;
04/02/2014 - ASUS pushed a new beta firmware release (3.0.0.4.374_4983);
04/02/2014 - ASUS resolved issue in beta firmware release (3.0.0.4.374_5047);
04/04/2014 - ASUS pushed beta firmware 3.0.0.4.374_5047 from beta to stable;
04/04/2014 - Advisory publishing date.

=====[5. References]==========================================================

[1] http://www.asus.com/Networking/RTAC68U/
[2] http://www.asus.com/Networking/RTAC68U/#support


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close