ID

VAR-201407-0318


CVE

CVE-2013-7389


TITLE

D-Link DIR-645 Router firmware cross-site scripting vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2013-006611

DESCRIPTION

Multiple cross-site scripting (XSS) vulnerabilities in D-Link DIR-645 Router (Rev. A1) with firmware before 1.04B11 allow remote attackers to inject arbitrary web script or HTML via the (1) deviceid parameter to parentalcontrols/bind.php, (2) RESULT parameter to info.php, or (3) receiver parameter to bsc_sms_send.php. D-Link DIR-645 Router (Rev. A1) Contains a cross-site scripting vulnerability.By a third party via the following parameters Web Script or HTML May be inserted. (1) parentalcontrols/bind.php of deviceid Parameters (2) info.php of RESULT Parameters (3) bsc_sms_send.php of receiver Parameters. The D-Link DIR-645 Widget function has an unexplained security vulnerability that allows a remote attacker to exploit the vulnerability to gain unauthorized access to the device. The D-Link DIR-645 is a wireless router device. D-Link DIR-645 \"post_login.xml\", \"hedwig.cgi\", \"authentication.cgi\" incorrectly filters user-submitted parameter data, allowing remote attackers to exploit exploits to submit specially crafted requests to trigger buffer overflows, allowing applications to Stop responding, causing a denial of service attack. Remote attackers can exploit these issues to execute arbitrary code in the context of the affected device or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and perform unauthorized actions. Other attacks may also be possible. D-Link DIR-645 running firmware 1.03B08 is vulnerable; other versions may also be affected. Multiple vulnerabilities on D-Link DIR-645 devices ================================================== [ADVISORY INFORMATION] Title: Multiple vulnerabilities on D-Link DIR-645 devices Discovery date: 06/03/2013 Release date: 02/08/2013 Advisory URL: http://roberto.greyhats.it/advisories/20130801-dlink-dir645.txt Credits: Roberto Paleari (roberto@greyhats.it, twitter: @rpaleari) [AFFECTED PRODUCTS] This security vulnerability affects the following products and firmware versions: * D-Link DIR-645, 1.03B08 Other products and firmware versions could also be vulnerable, but they were not checked. All of them are exploitable by remote, unauthenticated attackers. Details are outlined in the following, including some proof-of-concepts. 1. Buffer overflow on "post_login.xml" Invoking the "post_login.xml" server-side script, attackers can specify a "hash" password value that is used to authenticate the user. This hash value is eventually processed by the "/usr/sbin/widget" local binary. However, the latter copies the user-controlled hash into a statically-allocated buffer, allowing attackers to overwrite adjacent memory locations. As a proof-of-concept, the following URL allows attackers to control the return value saved on the stack (the vulnerability is triggered when executing "/usr/sbin/widget"): curl http://<target ip>/post_login.xml?hash=AAA...AAABBBB The value of the "hash" HTTP GET parameter consists in 292 occurrences of the 'A' character, followed by four occurrences of character 'B'. In our lab setup, characters 'B' overwrite the saved program counter (%ra). 2. Buffer overflow on "hedwig.cgi" Another buffer overflow affects the "hedwig.cgi" CGI script. Unauthenticated remote attackers can invoke this CGI with an overly-long cookie value that can overflow a program buffer and overwrite the saved program address. Proof-of-concept: curl -b uid=$(perl -e 'print "A"x1400;') -d 'test' http://<target ip>/hedwig.cgi 3. Buffer overflow on "authentication.cgi" The third buffer overflow vulnerability affects the "authentication.cgi" CGI script. This time the issue affects the HTTP POST paramter named "password". Again, this vulnerability can be abused to achieve remote code execution. As for all the previous issues, no authentication is required. Proof-of-concept: curl -b uid=test -d $(perl -e 'print "uid=test&password=asd" . "A"x2024;') http://<target ip>/authentication.cgi 4. Cross-site scripting on "bind.php" Proof-of-concept: curl "http://<target ip>/parentalcontrols/bind.php?deviceid=test'\"/><script>alert(1)</script><" 5. Cross-site scripting on "info.php" Proof-of-concept: curl "http://<target ip>/info.php?RESULT=testme\", msgArray); alert(1); //" 6. Cross-site scripting on "bsc_sms_send.php" Proof-of-concept: curl "http://<target ip>/bsc_sms_send.php?receiver=testme\"/><script>alert(1);</script><div" [REMEDIATION] D-Link has released an updated firmware version (1.04) that addresses this issue. The firmware is already available on D-Link web site, at the following URL: http://www.dlink.com/us/en/home-solutions/connect/routers/dir-645-wireless-n-home-router-1000 [DISCLAIMER] The author is not responsible for the misuse of the information provided in this security advisory. The advisory is a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice

Trust: 6.48

sources: NVD: CVE-2013-7389 // JVNDB: JVNDB-2013-006611 // CNVD: CNVD-2013-15550 // CNVD: CNVD-2013-15555 // CNVD: CNVD-2013-15556 // CNVD: CNVD-2013-11640 // CNVD: CNVD-2013-15551 // CNVD: CNVD-2013-11625 // CNVD: CNVD-2013-15554 // CNVD: CNVD-2013-15553 // BID: 61579 // VULHUB: VHN-67391 // VULMON: CVE-2013-7389 // PACKETSTORM: 122659

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 4.8

sources: CNVD: CNVD-2013-15550 // CNVD: CNVD-2013-15555 // CNVD: CNVD-2013-15556 // CNVD: CNVD-2013-11640 // CNVD: CNVD-2013-15551 // CNVD: CNVD-2013-11625 // CNVD: CNVD-2013-15554 // CNVD: CNVD-2013-15553

AFFECTED PRODUCTS

vendor:d linkmodel:dir-645 1.03b08scope: - version: -

Trust: 4.8

vendor:dlinkmodel:dir-645scope:eqversion:a1

Trust: 1.0

vendor:dlinkmodel:dir-645scope:lteversion:1.03

Trust: 1.0

vendor:d linkmodel:dir-645scope:eqversion:a1

Trust: 0.8

vendor:d linkmodel:dir-645scope:ltversion:1.04b11

Trust: 0.8

vendor:d linkmodel:dir-645scope:eqversion:1.03

Trust: 0.6

sources: CNVD: CNVD-2013-15550 // CNVD: CNVD-2013-15555 // CNVD: CNVD-2013-15556 // CNVD: CNVD-2013-11640 // CNVD: CNVD-2013-15551 // CNVD: CNVD-2013-11625 // CNVD: CNVD-2013-15554 // CNVD: CNVD-2013-15553 // JVNDB: JVNDB-2013-006611 // CNNVD: CNNVD-201308-024 // NVD: CVE-2013-7389

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-7389
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-7389
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2013-15550
value: HIGH

Trust: 0.6

CNVD: CNVD-2013-15555
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2013-15556
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2013-11640
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2013-15551
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2013-11625
value: HIGH

Trust: 0.6

CNVD: CNVD-2013-15554
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2013-15553
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201308-024
value: MEDIUM

Trust: 0.6

VULHUB: VHN-67391
value: MEDIUM

Trust: 0.1

VULMON: CVE-2013-7389
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-7389
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2013-15550
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2013-15555
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2013-15556
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2013-11640
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2013-15551
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2013-11625
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2013-15554
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2013-15553
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-67391
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-15550 // CNVD: CNVD-2013-15555 // CNVD: CNVD-2013-15556 // CNVD: CNVD-2013-11640 // CNVD: CNVD-2013-15551 // CNVD: CNVD-2013-11625 // CNVD: CNVD-2013-15554 // CNVD: CNVD-2013-15553 // VULHUB: VHN-67391 // VULMON: CVE-2013-7389 // JVNDB: JVNDB-2013-006611 // CNNVD: CNNVD-201308-024 // NVD: CVE-2013-7389

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-67391 // JVNDB: JVNDB-2013-006611 // NVD: CVE-2013-7389

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201308-024

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201308-024

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-006611

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-67391 // VULMON: CVE-2013-7389

PATCH

title:SAP10008url:http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10008

Trust: 0.8

title:D-Link DIR-645 /service.cgi special cookie remote command injection vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/41983

Trust: 0.6

title:D-Link DIR-645 version.php verifies patches that bypass remote information disclosure vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/41987

Trust: 0.6

title:D-Link DIR-645 getfile API path traversal patch for arbitrary file access vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/41988

Trust: 0.6

title:D-Link DIR-645 has multiple patches for cross-site scripting vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/38030

Trust: 0.6

title:D-Link DIR-645 Widget verifies patches for unauthorized access vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/41984

Trust: 0.6

title:D-Link DIR-645 has multiple buffer overflow vulnerability patchesurl:https://www.cnvd.org.cn/patchInfo/show/38029

Trust: 0.6

title:D-Link DIR-645 router_info.xml patch for remote information disclosure vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/41986

Trust: 0.6

title:D-Link DIR-645 '__ajax_explorer.sgi' verifies the patch that bypasses the vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/41985

Trust: 0.6

title:D-Link DIR-645 Fixes for Multiple Buffer Overflow and Cross-Site Scripting Vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=234981

Trust: 0.6

title: - url:https://github.com/0xdeceiverAngel/IOT_firmware_reverse_stuff

Trust: 0.1

sources: CNVD: CNVD-2013-15550 // CNVD: CNVD-2013-15555 // CNVD: CNVD-2013-15556 // CNVD: CNVD-2013-11640 // CNVD: CNVD-2013-15551 // CNVD: CNVD-2013-11625 // CNVD: CNVD-2013-15554 // CNVD: CNVD-2013-15553 // VULMON: CVE-2013-7389 // JVNDB: JVNDB-2013-006611 // CNNVD: CNNVD-201308-024

EXTERNAL IDS

db:DLINKid:SAP10008

Trust: 5.4

db:BIDid:61579

Trust: 3.3

db:NVDid:CVE-2013-7389

Trust: 2.9

db:OSVDBid:95953

Trust: 1.8

db:OSVDBid:95910

Trust: 1.8

db:OSVDBid:95952

Trust: 1.8

db:PACKETSTORMid:122659

Trust: 1.3

db:JVNDBid:JVNDB-2013-006611

Trust: 0.8

db:CNNVDid:CNNVD-201308-024

Trust: 0.7

db:CNVDid:CNVD-2013-15550

Trust: 0.6

db:CNVDid:CNVD-2013-15555

Trust: 0.6

db:CNVDid:CNVD-2013-15556

Trust: 0.6

db:CNVDid:CNVD-2013-11640

Trust: 0.6

db:CNVDid:CNVD-2013-15551

Trust: 0.6

db:CNVDid:CNVD-2013-11625

Trust: 0.6

db:CNVDid:CNVD-2013-15554

Trust: 0.6

db:CNVDid:CNVD-2013-15553

Trust: 0.6

db:EXPLOIT-DBid:27283

Trust: 0.2

db:SEEBUGid:SSVID-80897

Trust: 0.1

db:VULHUBid:VHN-67391

Trust: 0.1

db:VULMONid:CVE-2013-7389

Trust: 0.1

sources: CNVD: CNVD-2013-15550 // CNVD: CNVD-2013-15555 // CNVD: CNVD-2013-15556 // CNVD: CNVD-2013-11640 // CNVD: CNVD-2013-15551 // CNVD: CNVD-2013-11625 // CNVD: CNVD-2013-15554 // CNVD: CNVD-2013-15553 // VULHUB: VHN-67391 // VULMON: CVE-2013-7389 // BID: 61579 // JVNDB: JVNDB-2013-006611 // PACKETSTORM: 122659 // CNNVD: CNNVD-201308-024 // NVD: CVE-2013-7389

REFERENCES

url:http://securityadvisories.dlink.com/security/publication.aspx?name=sap10008

Trust: 5.4

url:http://www.securityfocus.com/bid/61579

Trust: 1.9

url:http://roberto.greyhats.it/advisories/20130801-dlink-dir645.txt

Trust: 1.9

url:http://osvdb.org/show/osvdb/95910

Trust: 1.8

url:http://osvdb.org/show/osvdb/95952

Trust: 1.8

url:http://osvdb.org/show/osvdb/95953

Trust: 1.8

url:http://packetstormsecurity.com/files/122659/dlinkdir645-overflowxss.txt

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7389

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-7389

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/27283/

Trust: 0.1

url:http://<target

Trust: 0.1

url:http://www.dlink.com/us/en/home-solutions/connect/routers/dir-645-wireless-n-home-router-1000

Trust: 0.1

sources: CNVD: CNVD-2013-15550 // CNVD: CNVD-2013-15555 // CNVD: CNVD-2013-15556 // CNVD: CNVD-2013-11640 // CNVD: CNVD-2013-15551 // CNVD: CNVD-2013-11625 // CNVD: CNVD-2013-15554 // CNVD: CNVD-2013-15553 // VULHUB: VHN-67391 // VULMON: CVE-2013-7389 // JVNDB: JVNDB-2013-006611 // PACKETSTORM: 122659 // CNNVD: CNNVD-201308-024 // NVD: CVE-2013-7389

CREDITS

Roberto Paleari

Trust: 1.0

sources: BID: 61579 // PACKETSTORM: 122659 // CNNVD: CNNVD-201308-024

SOURCES

db:CNVDid:CNVD-2013-15550
db:CNVDid:CNVD-2013-15555
db:CNVDid:CNVD-2013-15556
db:CNVDid:CNVD-2013-11640
db:CNVDid:CNVD-2013-15551
db:CNVDid:CNVD-2013-11625
db:CNVDid:CNVD-2013-15554
db:CNVDid:CNVD-2013-15553
db:VULHUBid:VHN-67391
db:VULMONid:CVE-2013-7389
db:BIDid:61579
db:JVNDBid:JVNDB-2013-006611
db:PACKETSTORMid:122659
db:CNNVDid:CNNVD-201308-024
db:NVDid:CVE-2013-7389

LAST UPDATE DATE

2024-11-23T22:23:04.883000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-15550date:2013-12-25T00:00:00
db:CNVDid:CNVD-2013-15555date:2013-12-25T00:00:00
db:CNVDid:CNVD-2013-15556date:2013-12-25T00:00:00
db:CNVDid:CNVD-2013-11640date:2013-08-06T00:00:00
db:CNVDid:CNVD-2013-15551date:2013-12-25T00:00:00
db:CNVDid:CNVD-2013-11625date:2013-08-06T00:00:00
db:CNVDid:CNVD-2013-15554date:2013-12-25T00:00:00
db:CNVDid:CNVD-2013-15553date:2013-12-25T00:00:00
db:VULHUBid:VHN-67391date:2016-12-31T00:00:00
db:VULMONid:CVE-2013-7389date:2023-04-26T00:00:00
db:BIDid:61579date:2014-07-08T15:38:00
db:JVNDBid:JVNDB-2013-006611date:2014-07-09T00:00:00
db:CNNVDid:CNNVD-201308-024date:2023-04-27T00:00:00
db:NVDid:CVE-2013-7389date:2024-11-21T02:00:54.403

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-15550date:2013-12-25T00:00:00
db:CNVDid:CNVD-2013-15555date:2013-12-25T00:00:00
db:CNVDid:CNVD-2013-15556date:2013-12-25T00:00:00
db:CNVDid:CNVD-2013-11640date:2013-08-06T00:00:00
db:CNVDid:CNVD-2013-15551date:2013-12-25T00:00:00
db:CNVDid:CNVD-2013-11625date:2013-08-06T00:00:00
db:CNVDid:CNVD-2013-15554date:2013-12-25T00:00:00
db:CNVDid:CNVD-2013-15553date:2013-12-25T00:00:00
db:VULHUBid:VHN-67391date:2014-07-07T00:00:00
db:VULMONid:CVE-2013-7389date:2014-07-07T00:00:00
db:BIDid:61579date:2013-08-02T00:00:00
db:JVNDBid:JVNDB-2013-006611date:2014-07-09T00:00:00
db:PACKETSTORMid:122659date:2013-08-02T15:28:11
db:CNNVDid:CNNVD-201308-024date:2013-08-06T00:00:00
db:NVDid:CVE-2013-7389date:2014-07-07T14:55:03.147