what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

NETGEAR CG814WG Cross Site Request Forgery

NETGEAR CG814WG Cross Site Request Forgery
Posted Sep 21, 2011
Site senseofsecurity.com.au

The NETGEAR Wireless Cable Modem Gateway model CG814WG suffers from authentication bypass, cross site request forgery, and other vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | ca0cb4ca523d4b1ed566b694edcda33f3ed5049b521a2b8f296b638be22fb96e

NETGEAR CG814WG Cross Site Request Forgery

Change Mirror Download
Sense of Security - Security Advisory - SOS-11-011

Release Date. 20-Sep-2011
Last Update. -
Vendor Notification Date. 22-Mar-2011
Product. NETGEAR Wireless Cable Modem Gateway
CG814WG
Affected versions. Hardware 1.03,
Software V3.9.26 R14 verified,
possibly others
Severity Rating. High
Impact. Authentication bypass,
Cross Site Request Forgery
Attack Vector. Remote without authentication
Solution Status. Upgrade to R15 (by contacting NETGEAR)
CVE reference. Not yet assigned

Details.
The NETGEAR Wireless Cable Modem Gateway CG814WG is supplied by ISP's
as customer premises equipment within Australia and abroad. It is a
centrally managed ISP solution whereby each ISP's devices run a
customised firmware and configuration changes and updates can be pushed
out as required.

Basic authentication is used as the primary and only authentication
mechanism for the administrator interface on the device. The basic
authentication can be bypassed by sending a valid POST request to the
device without sending any authentication header. The response from the
device sends the user to another page that requests basic
authentication, however at this point the request has already been
processed.

An example of attacks using the basic authentication bypass may include
changing the admin password or enabling the remote admin interface
(Internet facing).

Additionally, due to the lack of CSRF protection in the web application,
the bypass attack can be coupled with CSRF to have a victim enable the
remote admin interface to the Internet, where an attacker can then use
the bypass attack again across the remote admin interface to reset the
admin password and access the device. This attack is possible when
targeting a victim that is behind the NETGEAR device on the same segment
as the web administrator interface whom has browsed to a malicious site
containing the CSRF attack.

NETGEAR was notified of this vulnerability on 22 March 2011, but we
never received a response or acknowledgement of the issue or fix. Sense
of Security notified local ISP's and it was escalated by a local ISP
who worked with NETGEAR to develop and test an update. Sense of Security
was never provided an opportunity to validate the fixes in the latest
firmware version. Given the severity of the issue it would be prudent
for NETGEAR to notify and supply an update to all of its customers.

Proof of Concept.
By embedding the below HTML in a website and having a
victim browse to the website the remote management interface to the
Internet would be enabled. An attacker could then use one of the
hardcoded passwords for the device to access it, or use a basic
authentication bypass to change the admin password. Alternatively, the
attacker could conduct a CSRF attack that implements two POST requests
to have the remote admin interface enabled, and the admin password
changed.

The example here is a basic proof of concept, more complex examples
which include JavaScript redirects to mask the basic authentication
pop-up would be more stealthy.

<html>
<head></head>
<body onLoad=javascript:document.form.submit()>
<form action="http://192.168.0.1/goform/RgRemoteManagement"
method="POST" name="form">
<input type="hidden" name="NetgearRmEnable" value="0x01">
<input type="hidden" name="NetgearRmPortNumber" value="1337">
<input type="hidden" name="NetgearUserLevel" value="1">
</form>
</body>
</html>

Solution.
Ask your ISP to obtain the latest firmware from NETGEAR and deploy it
to your device.

Discovered by.
Sense of Security Labs.

About us.
Sense of Security is a leading provider of information
security and risk management solutions. Our team has expert
skills in assessment and assurance, strategy and architecture,
and deployment through to ongoing management. We are
Australia's premier application penetration testing firm and
trusted IT security advisor to many of the country's largest
organisations.

Sense of Security Pty Ltd
Level 8, 66 King St
Sydney NSW 2000
AUSTRALIA

T: +61 (0)2 9290 4444
F: +61 (0)2 9290 4455
W: http://www.senseofsecurity.com.au
E: info@senseofsecurity.com.au
Twitter: @ITsecurityAU

The latest version of this advisory can be found at:
http://www.senseofsecurity.com.au/advisories/SOS-11-011.pdf

Other Sense of Security advisories can be found at:
http://www.senseofsecurity.com.au/research/it-security-advisories.php
Login or Register to add favorites

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close