Full Disclosure mailing list archives
[GTA-2014-01] - Allied Telesis AT-RG634A ADSL Broadband router hidden administrative unauthenticated webshell.
From: Groundworks Technologies Advisories Team <advisories () groundworkstech com>
Date: Wed, 26 Mar 2014 10:39:24 -0300
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 *Title:* Allied Telesis AT-RG634A ADSL Broadband router hidden administrative unauthenticated webshell. *Vulnerability Information:* - - CVE: CVE-2014-1982 - - Type of Vulnerability: - CWE-78 : OS Command Injection - CWE-306 : Missing Authentication for Critical Function *Affected products:* - - Allied Telesis AT-RG634A ADSL Broadband router. (version 3.3+ and probably others) Other products like, - Allied Telesis iMG624A (firmware version, 3.5) - Allied Telesis iMG616LH (firmware version, +2.4) - Allied Telesis iMG646BD (firmware version, 3.5) *Vendor:* - - Allied Telesis : http://www.alliedtelesis.com// has the same vulnerbility, but the vendor reports that the version 3.8.05 of the firmware has already addressed this issue, but we where unable to test nor confirm this information. *Security Patches / Workaround:* - - Allied Telesis has noted that the AT-RG634A product is no longer supported, but gives a workaround to mitigate the issue. Configure the device so that only trusted devices can access the target device using the following command, "WEBSERVER SET MANAGEMENTIP <ip-address>" *Short Description:* The Allied Telesis AT-RG634A ADSL Broadband router has a hidden url page in their admnistrative HTTP interface capable of executing commands as admin without requiring any kind of authentication. *Description:* "The AT-RG634 is a full-featured, broadband media gateway and router designed for cost-effective delivery of advanced IP Triple Play voice, video and data services over an ADSL infrastructure. The RG634 supports Layer 3 functions, including NAT, DMZ, and Stateful inspection firewall for delivery of revenue-generating services such as home networking and security services." (from www.alliedtelesis.com/p-2345.html) The Allied Telesis AT-RG634A ADSL Broadband router has a hidden URL (/cli.html) page to execute CLI command with admin priviledges, available by default and without any kind of authentication. Having as impact a total compromise of the target device. *Steps to reproduce:* - - Connect via HTTP to the hidden page http://<device IP>/cli.html a input box is shown, every command typed there will be executed as admin. Entering the following lines in the hidden page (/cli.html) a new telnet admin user called "eviluser" is added to the system.
system add login eviluser system set user eviluser access superuser.
*Credits:* This security issue was discovered and researched by Sebastian Muniz (topo), Security Researcher of Groundworks Technologies (http://www.groundworkstech.com) *License:* The contents of this advisory are copyright (c) 2014 Groundworks Technologies,and are licensed under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 (United States) License: http://creativecommons.org/licenses/by-nc-sa/3.0/us/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQIbBAEBAgAGBQJTMtiMAAoJEA60Yy1ZGlWzNbQP+K3vYwmH+iilSZwf50ETLUnr k5vmOpIRxIZAkn2LyknUJgLfruoOTqu6TvxogAix1JuUvjzHPOp2q4Rm9gIGg++Q pBcg4B1qNQ0nRjjkEyQaPmT90ytI9uif4mSfdJDcQRj8ppLAvywbn0nnqdx75/Fo Z1wb5/OlGf9i4Ann97GnThmuLemXVUuskL84Dp1xKm7Rmvw53VC9xQeyJqA0RGN6 JHymvCTYpWYtbl9VHt5jZFz9L/xP17gcXzHWjG4c8jlhOQ3EtR4g96msS/hQ5Pa9 VZPwMhcXi+4w4y4z+1kK1fIc9Im+i8OSz0RRNsoYfvx6uJo74R73U3MOGyGHXyKL p+xTZLeKENidev2Xb52eHlEZpALSM91gxWgfTO3PnlXeOcRQc+8u7fqUT42RZDc0 m92H/fJTOBabTGGOJ8ayEWyWoKlWkRnHlmPfXa1g306eA/Pr8cJlRQxWgOVz5qio 3sljNSUyefA3Ib5C3PbnKx6VGTx2QGVpCDCUomuIN/N28twVzN+alYNsidmulH7n mi2Y+Gq4z46aUDLtjMW+RLFPQY1g6H4Kaql+7lEmujNZVzmdslzXGVq5ZVl+Qzuu Kiv4GbVWdlIHU1iO917v0J8vQYBDaVfQPDEM6OdKMJ2CLhoZg1YlaZgUovRVFNLQ afRt0bCgAvK7Wky0DM8= =ScKN -----END PGP SIGNATURE----- _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Current thread:
- [GTA-2014-01] - Allied Telesis AT-RG634A ADSL Broadband router hidden administrative unauthenticated webshell. Groundworks Technologies Advisories Team (Mar 26)