From 7ea8fca520f1de36ebe0aa9181f52e6034de24c8 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Fri, 14 Feb 2014 04:27:08 +0000 Subject: [PATCH] Updated 02_14_2014 --- files.csv | 24 ++ platforms/hardware/webapps/31617.txt | 475 +++++++++++++++++++++++++++ platforms/hardware/webapps/31618.txt | 302 +++++++++++++++++ platforms/java/webapps/31621.txt | 9 + platforms/multiple/dos/31615.rb | 109 ++++++ platforms/osx/dos/31619.ics | 50 +++ platforms/osx/dos/31620.ics | 68 ++++ platforms/php/webapps/31616.txt | 9 + platforms/php/webapps/31622.txt | 9 + platforms/php/webapps/31623.txt | 13 + platforms/php/webapps/31625.txt | 10 + platforms/php/webapps/31626.txt | 11 + platforms/php/webapps/31628.txt | 9 + platforms/php/webapps/31631.txt | 9 + platforms/php/webapps/31633.html | 7 + platforms/php/webapps/31636.txt | 9 + platforms/php/webapps/31637.txt | 9 + platforms/php/webapps/31639.txt | 9 + platforms/php/webapps/31640.txt | 9 + platforms/unix/dos/31627.c | 49 +++ platforms/unix/remote/31634.py | 71 ++++ platforms/windows/dos/31635.py | 81 +++++ platforms/windows/remote/31624.txt | 11 + platforms/windows/remote/31632.txt | 9 + platforms/windows/remote/31638.txt | 11 + 25 files changed, 1382 insertions(+) create mode 100755 platforms/hardware/webapps/31617.txt create mode 100755 platforms/hardware/webapps/31618.txt create mode 100755 platforms/java/webapps/31621.txt create mode 100755 platforms/multiple/dos/31615.rb create mode 100755 platforms/osx/dos/31619.ics create mode 100755 platforms/osx/dos/31620.ics create mode 100755 platforms/php/webapps/31616.txt create mode 100755 platforms/php/webapps/31622.txt create mode 100755 platforms/php/webapps/31623.txt create mode 100755 platforms/php/webapps/31625.txt create mode 100755 platforms/php/webapps/31626.txt create mode 100755 platforms/php/webapps/31628.txt create mode 100755 platforms/php/webapps/31631.txt create mode 100755 platforms/php/webapps/31633.html create mode 100755 platforms/php/webapps/31636.txt create mode 100755 platforms/php/webapps/31637.txt create mode 100755 platforms/php/webapps/31639.txt create mode 100755 platforms/php/webapps/31640.txt create mode 100755 platforms/unix/dos/31627.c create mode 100755 platforms/unix/remote/31634.py create mode 100755 platforms/windows/dos/31635.py create mode 100755 platforms/windows/remote/31624.txt create mode 100755 platforms/windows/remote/31632.txt create mode 100755 platforms/windows/remote/31638.txt diff --git a/files.csv b/files.csv index bd4b28e43..4e5a32781 100755 --- a/files.csv +++ b/files.csv @@ -28399,3 +28399,27 @@ id,file,description,date,author,platform,type,port 31611,platforms/php/webapps/31611.txt,"RobotStats 0.1 robotstats.inc.php DOCUMENT_ROOT Parameter Remote File Inclusion",2008-04-04,ZoRLu,php,webapps,0 31613,platforms/osx/remote/31613.ics,"Apple iCal 3.0.1 'COUNT' Parameter Integer Overflow Vulnerability",2008-04-21,"Core Security Technologies",osx,remote,0 31614,platforms/php/webapps/31614.txt,"Tiny Portal 1.0 'shouts' Cross-Site Scripting Vulnerability",2008-04-04,Y433r,php,webapps,0 +31615,platforms/multiple/dos/31615.rb,"Apache Commons FileUpload and Apache Tomcat Denial-of-Service",2014-02-12,"Trustwave's SpiderLabs",multiple,dos,0 +31616,platforms/php/webapps/31616.txt,"Web Server Creator 0.1 'langfile' Parameter Remote File Include Vulnerability",2008-04-04,ZoRLu,php,webapps,0 +31617,platforms/hardware/webapps/31617.txt,"NetGear DGN2200 N300 Wireless Router - Multiple Vulnerabilities",2014-02-12,"Andrew Horton",hardware,webapps,0 +31618,platforms/hardware/webapps/31618.txt,"jDisk (stickto) v2.0.3 iOS - Multiple Vulnerabilities",2014-02-12,Vulnerability-Lab,hardware,webapps,0 +31619,platforms/osx/dos/31619.ics,"Apple iCal 3.0.1 'TRIGGER' Parameter Denial of Service Vulnerability",2008-04-21,"Rodrigo Carvalho",osx,dos,0 +31620,platforms/osx/dos/31620.ics,"Apple iCal 3.0.1 'ATTACH' Parameter Denial Of Service Vulnerability",2008-04-21,"Core Security Technologies",osx,dos,0 +31621,platforms/java/webapps/31621.txt,"Sun Java System Messenger Express 6.1-13-15 'sid' Cross-Site Scripting Vulnerability",2008-04-07,syniack,java,webapps,0 +31622,platforms/php/webapps/31622.txt,"URLStreet 1.0 'seeurl.php' Multiple Cross-Site Scripting Vulnerabilities",2008-04-07,ZoRLu,php,webapps,0 +31623,platforms/php/webapps/31623.txt,"Wikepage Opus 13 2007.2 'index.php' Multiple Directory Traversal Vulnerabilities",2008-04-07,A.nosrati,php,webapps,0 +31624,platforms/windows/remote/31624.txt,"Microsoft Internet Explorer 7.0 Header Handling 'res://' Information Disclosure Vulnerability",2008-04-07,"The Hacker Webzine",windows,remote,0 +31625,platforms/php/webapps/31625.txt,"Prozilla Gaming Directory 1.0 SQL Injection Vulnerability",2008-04-05,t0pP8uZz,php,webapps,0 +31626,platforms/php/webapps/31626.txt,"Prozilla Software Index 1.1 SQL Injection Vulnerability",2008-04-05,t0pP8uZz,php,webapps,0 +31627,platforms/unix/dos/31627.c,"LICQ <= 1.3.5 File Descriptor Remote Denial of Service Vulnerability",2008-04-08,"Milen Rangelov",unix,dos,0 +31628,platforms/php/webapps/31628.txt,"Swiki 1.5 HTML Injection and Cross-Site Scripting Vulnerabilities",2008-04-08,"Brad Antoniewicz",php,webapps,0 +31631,platforms/php/webapps/31631.txt,"Pragmatic Utopia PU Arcade <= 2.2 'gid' Parameter SQL Injection Vulnerability",2008-04-09,MantiS,php,webapps,0 +31632,platforms/windows/remote/31632.txt,"Microsoft SharePoint Server 2.0 Picture Source HTML Injection Vulnerability",2008-04-09,OneIdBeagl3,windows,remote,0 +31633,platforms/php/webapps/31633.html,"phpBB Fishing Cat Portal Addon 'functions_portal.php' Remote File Include Vulnerability",2008-04-09,bd0rk,php,webapps,0 +31634,platforms/unix/remote/31634.py,"Python zlib Module Remote Buffer Overflow Vulnerability",2008-04-09,"Justin Ferguson",unix,remote,0 +31635,platforms/windows/dos/31635.py,"WinWebMail 3.7.3 IMAP Login Data Handling Denial Of Service Vulnerability",2008-04-10,ryujin,windows,dos,0 +31636,platforms/php/webapps/31636.txt,"W2B phpHotResources 'cat.php' SQL Injection Vulnerability",2008-04-11,The-0utl4w,php,webapps,0 +31637,platforms/php/webapps/31637.txt,"W2B Dating Club 'browse.php' SQL Injection Vulnerability",2008-04-11,The-0utl4w,php,webapps,0 +31638,platforms/windows/remote/31638.txt,"HP OpenView Network Node Manager 7.x (OV NNM) OpenView5.exe Action Parameter Traversal Arbitrary File Access",2008-04-11,"Luigi Auriemma",windows,remote,0 +31639,platforms/php/webapps/31639.txt,"Trillian 3.1.9 DTD File XML Parser Buffer Overflow Vulnerability",2008-04-11,david130490,php,webapps,0 +31640,platforms/php/webapps/31640.txt,"osCommerce Poll Booth 2.0 Add-On 'pollbooth.php' SQL Injection Vulnerability",2008-04-13,S@BUN,php,webapps,0 diff --git a/platforms/hardware/webapps/31617.txt b/platforms/hardware/webapps/31617.txt new file mode 100755 index 000000000..6cb594b38 --- /dev/null +++ b/platforms/hardware/webapps/31617.txt @@ -0,0 +1,475 @@ +Title: Multiple vulnerabilities in NETGEAR N300 WIRELESS ADSL2+ MODEM ROUTER DGN2200 +==================================================================================== + + Notification Date: 11 February 2014 + Affected Vendor: NetGear + Affected Hardware: NetGear DGN2200 N300 Wireless ADSL2+ Modem Router + Firmware Version: V1.0.0.36-7.0.37 + Issue Types: * Command Injection + * Cross-site Request Forgery + * UPNP Exploitation through Cross-site Request Forgery + * Insecure FTP Root + * Cannot Disable WPS + * Passwords Stored in Plaintext + * Information Disclosure + * Firmware Update MITM + Advisory Code: AIS-2014-003 + Discovered by: Andrew Horton + Issue status: No patch available - product beyond End of Life + + +Summary +======= +BAE Systems Applied Intelligence researcher, Andrew Horton has identified that the NetGear N300 Wireless ADSL 2+ Modem Router model DGN2200 suffers from multiple vulnerabilities which may be exploited by both local and remote attackers. This enables an attacker to completely compromise the device and stage further attacks against the local network and internet. + +NetGear have indicated that this product is beyond its end of life and therefore these vulnerabilities will not be patched. As a result, BAE Systems have delayed release of this advisory for over 12 months to reduce the likelihood of active exploitation. + + +1. UPNP Vulnerable to CSRF +=========================== + +Requires +-------- +Luring an unauthenticated or authenticated user to an attacker-controlled webpage. + + +Description +----------- +The Universal Plug and Play (UPNP) implementation used by NetGear accepts an HTTP POST request as a valid XML request, rendering the UPNP service vulnerable to inter-protocol Cross-Site Request Forgery attacks. This can be used to bypass or alter firewall rules. + +The UPNP interface of the router listens on TCP port 5000 and can only be accessed from the LAN side of the device. UPNP requests do not require authentication with passwords. This vulnerability exists because the request is initiated by a user's browser on the LAN side of the device. + + +Impact +------ +Using this vulnerability, BAE Systems was able to add new firewall rules to enable internet access to the insecure telnet port and the admin web interface. + + +Proof of concept +---------------- +The following webpage will make telnet for the router accessible to the internet so that it may be attacked using the GearDog backdoor (See issue 5). The GearDog backdoor is a known remote access backdoor implemented in many NetGear products. This requires brute-forcing the MAC address. + + +
+