Comtrend HG536+ vulnerabilities
Vendor url:www.comtrend.com
Advisore Url:http://lostmon.blogspot.com/2009/04/
comtrend-hg536-vulnerabilities.html
Vendor notify: NO
#########################################
These Flaws are discovered before by Isecauditors
see http://www.securityfocus.com/bid/32975
sorry for the inconvenience...
#####################
Description By vendor
#####################
The HG536+ is an 802.11g (54Mbps) wireless and wired
Local Area Network (WLAN) ADSL router. Four 10/100
Base-T Ethernet ports provide wired LAN connectivity
with an integrated 802.11g WiFi WLAN Access Point for
wireless connectivity.
################
Vulnerabilities
################
this device is by default with this settings:
==========================================
l LAN port IP address: 192.168.1.1
l Local administrator account name: admin
l Local administrator account password: admin
l Local non- administrator account name: user
l Local non- administrator account password: user
l Remote WAN access: disabled
l Remote WAN access account name: support
l Remote WAN access account password: support
l NAT: enable and firewall: disable
l DHCP server on LAN interface: enable
l WAN IP address: none
============================================
All Of this flaws are because the access control
is based in a ineffective javascript control in
'menuBcm.js' file that enables or disables view
items in the menu.html file, according of user
was logged in.
For this reason a minimal user , can call directly
all pages,that are parts of the web interface
bypassing the "pseudo restrictions" access role.
for exploit all flaws , a minimal account credentials
are required.
Vuln 1 => access Control error
if a user has access to non administrator user
by entering username "user" and password "user"
with this user only can update the firmware , manage
SNMP ,and view some status in the router ,and do
diagnostics , about adsl connectivity.This user
aparently is "restricted" to take some actions.
This router in this firmware version , has a
access control error and a user without privileges
( user-user) can access to all functions if he
make a direct request to the interested file or
functions.
example :
this user has no access to manage the setup of router
but by entering http://192.168.1.1/wancfg.cmd
he can configure the WAN settings.
download the config =>
http://192.168.1.1/backupsettings.html
view wireless key =>
http://192.168.1.1/wlsecurity.html
Vuln 2 => clear text admin passwords disclosure.
login in the router with user -user account
and open http://192.168.1.1/password.html
try to view the source code...
in the source we found :
=======================
pwdAdmin = 'admin';
pwdSupport = 'support;
pwdUser = 'user';
=======================
###############
versions
###############
Comtrend HG536+
firmware A101-302JAZ-C03_R14.A2pB021g.d15h
##############
Solution
#############
No solution was available at this time.
by default this router is configured for
denied the access from WAN connections
But this style attack can be done if any
user is inside the LAN or if enable the
access from WAN.
configure to deny Wan connections and
Grant access to device ,only to trust users.
################# €nd #############
--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Google group: http://groups.google.com/group/lostmon (new)
--
La curiosidad es lo que hace mover la mente....