ID

VAR-200405-0038


CVE

CVE-2004-2032


TITLE

Netgear RP114 content filtering bypasses vulnerability

Trust: 0.6

sources: CNVD: CNVD-2004-1507

DESCRIPTION

Netgear RP114 allows remote attackers to bypass the keyword based URL filtering by requesting a long URL, as demonstrated using a large number of %20 (hex-encoded space) sequences. NetGear RP114 router can access management through TELNET and HTTP.  NetGear RP114 router content filtering problem, remote attackers can use this vulnerability to access restricted resources.  If the URI string requested by the user exceeds 220 bytes, the content filtering function of NetGear RP114 can be bypassed. This problem can cause administrators to ignore some security. This vulnerability may result in a false sense of security for a network administrator, where a malicious website is believed to be unreachable. In reality any host may contact blacklisted websites. D-Link DIR-100 long url filter evasion scip AG Vulnerability ID 3808 (09/08/2008) http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=3808 I. INTRODUCTION D-Link DIR-100 is a small and cost-effective router and firewall device for small offices and home users. More details are available at the official product web site (German link): http://www.dlink.de/?go=gNTyP9CgrdFOIC4AStFCF834mptYKO9ZTdvhLPG3yV3oV492gqltbNlwaaFp6DQoHDrpxC5H+40AAdvl II. DESCRIPTION Marc Ruef at scip AG found a possibility to evade url filters of the web proxy to prevent access to web sites. An attacker might add a very long string to the url to access web resources althought their access is forbidden. This problem could be verified in all firmware versions up to v1.12. A similar vulnerability was already detected years ago in a similar device Netgear RP114. [1, 2] III. EXPLOITATION It is possible to exploit the vulnerability with a common web browser by using a long url (approx. 1'300 chars). You can expand the length of the url by adding a non-used http get request parameter. Example url: http://www.scip.ch/?foo=aaa(...) A video illustrating this issue is available at the following url: http://de.youtube.com/watch?v=WTzPn37XNl4 The Attack Tool Kit (ATK)[3] is able to exploit this vulnerability with the following generic ASL code (expand the long URL request): open|send GET http://www.scip.ch/?foo=aaa(...) HTTP/1.0\n\n|sleep|close|pattern_not_exists *This URL is <font color=red>blocked</font> by administrator !* IV. V. DETECTION Detection of web based attacks requires a specialized web proxy and/or intrusion detection system. Patterns for such a detection are available and easy to implement. VI. SOLUTION We have informed D-Link on an early stage. Our technical requests were not answered nor confirmed. Therefore, not official statement, patch or upgrade is available. We suggest the use of another device for filtering forbidden web resources successfully. VII. VENDOR RESPONSE D-Link has been informed first via the unhandy web form at http://www.dlink.com (no public mail address for such cases could be found). The first responses claimed that the problem must be within a wrong configuration setting. Further discussions were initiated. The support was not able to understand the problem. Not even after several step-by-step guides and examples. They always suggest I have to upgrade to the latest firmware and they could not verify the problem. Therefore, no official solution, workaround or patch is available. VIII. SOURCES scip AG - Security Consulting Information Process (german) http://www.scip.ch/ scip AG Vulnerability Database (german) http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=3808 computec.ch document data base (german) http://www.computec.ch/download.php IX. DISCLOSURE TIMELINE 2008/07/25 Identification of the vulnerability by Marc Ruef 2008/07/28 First information to D-Link via web form 2008/07/28 First reply by D-Link support via support@service.dlink.biz (ticket id 1375981) 2008/07/29 Providing our config for further analysis 2008/08/06 Request for actual status (no reply) 2008/08/29 Another request for actual status 2008/08/29 Response could not verify the problem 2008/09/01 Detailed explanation of the exploitation 2008/09/01 Responder could still not understand the problem 2008/09/08 Public disclosure of the advisory X. CREDITS The vulnerability was discovered by Marc Ruef. Marc Ruef, scip AG, Zuerich, Switzerland maru-at-scip.ch http://www.scip.ch/ A1. BIBLIOGRAPHY [1] http://www.securityfocus.com/bid/10404 [2] http://seclists.org/bugtraq/2004/May/0263.html [3] http://www.computec.ch/projekte/atk/ A2. LEGAL NOTICES Copyright (c) 2007-2008 scip AG, Switzerland. Permission is granted for the re-distribution of this alert. It may not be edited in any way without permission of scip AG. The information in the advisory is believed to be accurate at the time of publishing based on currently available information. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect or consequential loss or damage from use of or reliance on this advisory

Trust: 1.89

sources: NVD: CVE-2004-2032 // CNVD: CNVD-2004-1507 // BID: 10404 // VULHUB: VHN-10460 // PACKETSTORM: 69733

AFFECTED PRODUCTS

vendor:netgearmodel:rp114scope:eqversion:3.26

Trust: 1.9

vendor:nonemodel: - scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2004-1507 // BID: 10404 // CNNVD: CNNVD-200405-059 // NVD: CVE-2004-2032

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-2032
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200405-059
value: HIGH

Trust: 0.6

VULHUB: VHN-10460
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2004-2032
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-10460
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-10460 // CNNVD: CNNVD-200405-059 // NVD: CVE-2004-2032

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-2032

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200405-059

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200405-059

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-10460

EXTERNAL IDS

db:NVDid:CVE-2004-2032

Trust: 2.3

db:BIDid:10404

Trust: 2.1

db:OSVDBid:6411

Trust: 1.7

db:SECUNIAid:11698

Trust: 1.7

db:CNNVDid:CNNVD-200405-059

Trust: 0.7

db:CNVDid:CNVD-2004-1507

Trust: 0.6

db:XFid:114

Trust: 0.6

db:XFid:16238

Trust: 0.6

db:BUGTRAQid:20040524 NETGEAR RP114 URL FILTER FAILS IF URL IS TOO LONG

Trust: 0.6

db:EXPLOIT-DBid:24140

Trust: 0.1

db:SEEBUGid:SSVID-77875

Trust: 0.1

db:VULHUBid:VHN-10460

Trust: 0.1

db:PACKETSTORMid:69733

Trust: 0.1

sources: CNVD: CNVD-2004-1507 // VULHUB: VHN-10460 // BID: 10404 // PACKETSTORM: 69733 // CNNVD: CNNVD-200405-059 // NVD: CVE-2004-2032

REFERENCES

url:http://www.securityfocus.com/bid/10404

Trust: 1.8

url:http://www.osvdb.org/6411

Trust: 1.7

url:http://secunia.com/advisories/11698

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/16238

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=108541203427391&w=2

Trust: 1.0

url:http://xforce.iss.net/xforce/xfdb/16238

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=108541203427391&w=2

Trust: 0.6

url:http://www.netgear.com/

Trust: 0.3

url:http://www.netgear.com/product_view.asp?xrp=4&yrp=12&zrp=93

Trust: 0.3

url:http://marc.info/?l=bugtraq&amp;m=108541203427391&amp;w=2

Trust: 0.1

url:http://de.youtube.com/watch?v=wtzpn37xnl4

Trust: 0.1

url:http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=3808

Trust: 0.1

url:http://www.dlink.com

Trust: 0.1

url:http://www.computec.ch/projekte/atk/

Trust: 0.1

url:http://www.dlink.de/?go=gntyp9cgrdfoic4astfcf834mptyko9ztdvhlpg3yv3ov492gqltbnlwaafp6dqohdrpxc5h+40aadvl

Trust: 0.1

url:http://www.computec.ch/download.php

Trust: 0.1

url:http://www.scip.ch/

Trust: 0.1

url:http://seclists.org/bugtraq/2004/may/0263.html

Trust: 0.1

url:http://www.scip.ch/?foo=aaa(...)

Trust: 0.1

sources: VULHUB: VHN-10460 // BID: 10404 // PACKETSTORM: 69733 // CNNVD: CNNVD-200405-059 // NVD: CVE-2004-2032

CREDITS

Marc Ruef※ marc.ruef@computec.ch

Trust: 0.6

sources: CNNVD: CNNVD-200405-059

SOURCES

db:CNVDid:CNVD-2004-1507
db:VULHUBid:VHN-10460
db:BIDid:10404
db:PACKETSTORMid:69733
db:CNNVDid:CNNVD-200405-059
db:NVDid:CVE-2004-2032

LAST UPDATE DATE

2024-08-14T13:40:28.331000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2004-1507date:2004-05-24T00:00:00
db:VULHUBid:VHN-10460date:2017-07-11T00:00:00
db:BIDid:10404date:2004-05-24T00:00:00
db:CNNVDid:CNNVD-200405-059date:2005-10-20T00:00:00
db:NVDid:CVE-2004-2032date:2017-07-11T01:31:34.153

SOURCES RELEASE DATE

db:CNVDid:CNVD-2004-1507date:2004-05-24T00:00:00
db:VULHUBid:VHN-10460date:2004-05-24T00:00:00
db:BIDid:10404date:2004-05-24T00:00:00
db:PACKETSTORMid:69733date:2008-09-08T15:23:16
db:CNNVDid:CNNVD-200405-059date:2004-05-24T00:00:00
db:NVDid:CVE-2004-2032date:2004-05-24T04:00:00