diff --git a/files.csv b/files.csv index 49020e8fd..2fe630d53 100755 --- a/files.csv +++ b/files.csv @@ -35723,3 +35723,5 @@ id,file,description,date,author,platform,type,port 39483,platforms/multiple/dos/39483.txt,"Wireshark - add_ff_vht_compressed_beamforming_report Static Out-of-Bounds Read",2016-02-22,"Google Security Research",multiple,dos,0 39484,platforms/multiple/dos/39484.txt,"Wireshark - dissect_ber_set Static Out-of-Bounds Read",2016-02-22,"Google Security Research",multiple,dos,0 39485,platforms/asp/webapps/39485.txt,"Thru Managed File Transfer Portal 9.0.2 - SQL Injection",2016-02-22,"SySS GmbH",asp,webapps,80 +39487,platforms/multiple/dos/39487.py,"libquicktime 1.2.4 - Integer Overflow",2016-02-23,"Marco Romano",multiple,dos,0 +39488,platforms/json/webapps/39488.txt,"Ubiquiti Networks UniFi 3.2.10 - CSRF Vulnerability",2016-02-23,"Julien Ahrens",json,webapps,8443 diff --git a/platforms/json/webapps/39488.txt b/platforms/json/webapps/39488.txt new file mode 100755 index 000000000..047a40a55 --- /dev/null +++ b/platforms/json/webapps/39488.txt @@ -0,0 +1,104 @@ +RCE Security Advisory +https://www.rcesecurity.com + + +1. ADVISORY INFORMATION +----------------------- +Product: Ubiquiti Networks UniFi +Vendor URL: www.ubnt.com +Type: Cross-Site Request Forgery [CWE-353] +Date found: 2015-03-19 +Date published: 2016-02-23 +CVSSv3 Score: 6.3 (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) +CVE: - + + +2. CREDITS +---------- +This vulnerability was discovered and researched by Julien Ahrens from +RCE Security. + + +3. VERSIONS AFFECTED +-------------------- +UniFi v3.2.10 +older versions may be affected too. + + +4. INTRODUCTION +--------------- +The UniFiĀ® Controller software is a powerful, enterprise wireless software +engine ideal for high-density client deployments requiring low latency and +high uptime performance. A single UniFi Controller running in the cloud +can manage multiple sites: multiple, distributed deployments and +multi-tenancy for managed service providers. + +(from the vendor's homepage) + + +5. VULNERABILITY DESCRIPTION +---------------------------- +A generic Cross-Site Request Forgery protection bypass vulnerability was +identified in UniFi v3.2.10 and prior. + +The application uses a CSRF protection, which is based on verifying the +Referer header, but does not catch the case where the Referer header +is completely missing. + +This leads to a generic CSRF protection bypass, resulting in all +application specific functionalities becoming vulnerable. An attacker needs +to trick the victim to visit an arbitrary website in order to exploit the +vulnerability. Successful exploits can allow the attacker to compromise the +whole application including connected devices, e.g. by changing passwords +of users, adding new users, changing device usernames and passwords or by +creating new WLAN configurations. + + +6. PROOF-OF-CONCEPT +------------------- +The following PoC changes the password of the user "admin" to "csrfpwd": + + + + + + +