ID

VAR-201703-1033


CVE

CVE-2017-6411


TITLE

D-Link DSL-2730U Cross-Site Request Forgery Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2017-02616 // CNNVD: CNNVD-201703-015

DESCRIPTION

Cross Site Request Forgery (CSRF) on D-Link DSL-2730U C1 IN_1.00 devices allows remote attackers to change the DNS or firewall configuration or any password. The D-linkDI-604 is a small router device. CruxPA is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. CruxPA 2.00 is vulnerable; prior versions may also be affected. D-Link DSL-2730U is prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible. Author : B GOVIND Exploit Title : DLink DSL-2730U Wireless N 150, Change DNS Configuration bypassing aadmina privilege Date : 01-03-2017 Vendor Homepage : http://www.dlink.co.in Firmware Link : ftp://support.dlink.co.in/firmware/DSL-2730U Affected version : Hardware ver C1, Firmware ver: IN_1.0.0 Email id : govindnair7102@gmail.com CVE : CVE-2017-6411 Change DNS Configuration Bypassing aadmina Privilege ------------------------------------------------------- D-Link DSL-2730U wireless router is a very popular SOHO network device used in India. This device has three default accounts aadmina, asupporta and ausera. As per D-Link only aadmin" account has unrestricted access to change configuration of device. Account name ausera can just view configuration settings and statistics. 1. Description of Vulnerability Cross Site Request Forgery can be used to manipulate dnscfg.cgi in this device. An insider / external attacker (remote management to be enabled for external attacker) can change primary and secondary DNS IP address to some malicious IP address without using aadmina account. 2. Proof of Concept Use following URL to modify the DNS entries: http://user:user@192.168.1.1/dnscfg.cgi?dnsPrimary=x.x.x.x&dnsSecondary=y.y.y.y&dnsIfcsList=&dnsRefresh=1 Here x.x.x.x and y.y.y.y are the malicious IP address attacker can use. 3. Impact of vulnerability Information Disclosure: An attacker exploiting this vulnerability can obtain confidential information like users browsing profile. Modifying device DNS settings allows cybercriminals to perform malicious activities like the following: (a) Redirect user traffic to malicious/fake sites. These sites can be phishing pages that spoofs well-known sites and tricks users into submit sensitive user credentials like banks account username and password. (b) This can ensure that no more patches are updated from OS vendor sites or firewall sites. (c) Replace ads on legitimate sites and serve users with unwanted/fake ads. (d) Pushing malwares. 4. Solution As per D-Link India this is the only no updated firmware is available for this hardware version which can mitigate this vulnerability which avoids privilege escalation. All users of this hardware should change default passwords of not just aadmina account but also ausera and asupporta Change All Account Password Bypassing aadmina Privilege ---------------------------------------------------------- D-Link DSL-2730U wireless router is a very popular SOHO network device used in India. This device has three default accounts aadmina, asupporta and ausera. As per D-Link only aadmin" account has unrestricted access to change configuration of device. Account name ausera can just view configuration settings and statistics. Default password of admin, support and user account are admin, support and user respectively. 1. Description of Vulnerability Cross Site Request Forgery can be used to manipulate password.cgi in this device. 2. Proof of Concept This exploit works only when accounts are using default password. Use following URL to change aadmina account password from aadmina to aadmin1a. http://user:user@192.168.1.1/password.cgi? inUserName=admin&inPassword=ZGFyZWFkbWluMQ==&inOrgPassword=ZGFyZWFkbWlu (b) Use following URL to change asupporta account password from asupporta to asupport1a. http://user:user@192.168.1.1/password.cgi? inUserName=support&inPassword=ZGFyZXN1cHBvcnQx&inOrgPassword=ZGFyZXN1cHBvcnQ= (c) Use following URL to change ausera account password from ausera to auser1a. http://user:user@192.168.1.1/password.cgi? inUserName=user&inPassword=ZGFyZXVzZXIx&inOrgPassword=ZGFyZXVzZXI= Here ainPassworda is the new password and ainOrgPassworda is the existing password. Both these password strings are base64 encoded for confidentiality as connection between browser and web server is using http. 3. Impact of vulnerability Elevation of privilege, Information Disclosure, Denial Of service (a) Insider/Attacker can change the passwords of all the existing accounts and control the device as required. This will result in attacker having complete control over the device. He can capture traffic of other user and analyse traffic. Attacker can deny services as per his/her choice. 4. Solution As per D-Link India this is the only no updated firmware available for this hardware version which can mitigate this vulnerability. All users of this hardware should change default passwords of all the default accounts. Enable/Disable LAN side Firewall without admin privilege --------------------------------------------------------- D-Link DSL-2730U wireless router is a very popular SOHO network device used in India. This device has three default accounts aadmina, asupporta and ausera. As per D-Link only aadmin" account has unrestricted access to change configuration of device. Account name ausera can just view configuration settings and statistics. Default password of admin, support and user account are admin, support and user respectively. 1. Description of Vulnerability Cross Site Request Forgery can be used to manipulate lancfg2.cgi in this device. An insider / external attacker (remote management to be enabled for external attacker) can enable/disable LAN side firewall without aadmina privilege using auser a account. 2. Proof of Concept Use following URL to enable LAN side firewall http://user:user@192.168.1.1/lancfg2.cgi?ethIpAddress=192.168.1.1&eth SubnetMask=255.255.255.0&enblLanFirewall=1&enblIgmpSnp=0&enblIgmpMode=0&dhcpEthStart=192.168.1.2&dhcpEthEnd=192.168.1.254&dhcpLeasedTime=86400&enblDhcpSrv=1&enblLan2=0&enblLanDns=0 Use following URL to disable LAN side firewall http://user:user@192.168.1.1/lancfg2.cgi?ethIpAddress=192.168.1.1&ethSubnetMask=255.255.255.0&enblLanFirewall=0&enblIgmpSnp=0&enblIgmpMode=0&dhcpEthStart=192.168.1.2&dhcpEthEnd=192.168.1.254&dhcpLeasedTime=86400&enblDhcpSrv=1&enblLan2=0&enblLanDns=0 3. Impact of vulnerability By disabling LAN side firewall and by enabling Port Triggering, an attacker can ensure a backdoor access within LAN side as well as from WAN side. Attacker can run port scanning tools to map services which otherwise wont be possible with firewall enabled. 4. Solution As per D-Link India this is the only no updated firmware available for this hardware version which can mitigate this vulnerability. All users of this hardware should change default passwords of all the default accounts

Trust: 2.88

sources: NVD: CVE-2017-6411 // JVNDB: JVNDB-2017-002114 // CNVD: CNVD-2017-02616 // BID: 41478 // BID: 96560 // VULHUB: VHN-114614 // PACKETSTORM: 141390

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-02616

AFFECTED PRODUCTS

vendor:dlinkmodel:dsl-2730uscope:eqversion:in_1.00

Trust: 1.6

vendor:d linkmodel:dsl-2730uscope: - version: -

Trust: 0.8

vendor:d linkmodel:dsl-2730uscope:eqversion:c1 in_1.00

Trust: 0.8

vendor:d linkmodel:dsl-2730u c1 in 1.00scope: - version: -

Trust: 0.6

vendor:cruxmodel:software cruxpascope:eqversion:2.00

Trust: 0.3

vendor:dlinkmodel:dsl-2730u c1 in 1.00scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2017-02616 // BID: 41478 // BID: 96560 // JVNDB: JVNDB-2017-002114 // CNNVD: CNNVD-201703-015 // NVD: CVE-2017-6411

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6411
value: HIGH

Trust: 1.0

NVD: CVE-2017-6411
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-02616
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201703-015
value: HIGH

Trust: 0.6

VULHUB: VHN-114614
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-6411
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-02616
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-114614
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6411
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-02616 // VULHUB: VHN-114614 // JVNDB: JVNDB-2017-002114 // CNNVD: CNNVD-201703-015 // NVD: CVE-2017-6411

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-114614 // JVNDB: JVNDB-2017-002114 // NVD: CVE-2017-6411

THREAT TYPE

network

Trust: 0.6

sources: BID: 41478 // BID: 96560

TYPE

Input Validation Error

Trust: 0.6

sources: BID: 41478 // BID: 96560

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-002114

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-114614

PATCH

title:Top Pageurl:http://www.dlink.com/

Trust: 0.8

title:Patch for D-LinkDSL-2730U Cross-Site Request Forgery Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/90385

Trust: 0.6

sources: CNVD: CNVD-2017-02616 // JVNDB: JVNDB-2017-002114

EXTERNAL IDS

db:NVDid:CVE-2017-6411

Trust: 3.5

db:BIDid:96560

Trust: 3.4

db:EXPLOIT-DBid:41478

Trust: 2.3

db:BIDid:41478

Trust: 0.9

db:JVNDBid:JVNDB-2017-002114

Trust: 0.8

db:CNNVDid:CNNVD-201703-015

Trust: 0.7

db:CNVDid:CNVD-2017-02616

Trust: 0.6

db:PACKETSTORMid:141390

Trust: 0.2

db:VULHUBid:VHN-114614

Trust: 0.1

sources: CNVD: CNVD-2017-02616 // VULHUB: VHN-114614 // BID: 41478 // BID: 96560 // JVNDB: JVNDB-2017-002114 // PACKETSTORM: 141390 // CNNVD: CNNVD-201703-015 // NVD: CVE-2017-6411

REFERENCES

url:https://www.exploit-db.com/exploits/41478/

Trust: 2.3

url:http://www.securityfocus.com/bid/96560

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6411

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-6411

Trust: 0.8

url:http://www.securityfocus.com/bid/96560/info

Trust: 0.8

url:http://www.cruxsoftware.co.uk/cruxpa.php

Trust: 0.3

url:/archive/1/512240

Trust: 0.3

url:http://www.dlink.com/

Trust: 0.3

url:http://user:user@192.168.1.1/password.cgi?

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-6411

Trust: 0.1

url:http://www.dlink.co.in

Trust: 0.1

url:http://user:user@192.168.1.1/lancfg2.cgi?ethipaddress=192.168.1.1&eth

Trust: 0.1

url:http://user:user@192.168.1.1/lancfg2.cgi?ethipaddress=192.168.1.1&ethsubnetmask=255.255.255.0&enbllanfirewall=0&enbligmpsnp=0&enbligmpmode=0&dhcpethstart=192.168.1.2&dhcpethend=192.168.1.254&dhcpleasedtime=86400&enbldhcpsrv=1&enbllan2=0&enbllandns=0

Trust: 0.1

url:http://user:user@192.168.1.1/dnscfg.cgi?dnsprimary=x.x.x.x&dnssecondary=y.y.y.y&dnsifcslist=&dnsrefresh=1

Trust: 0.1

sources: CNVD: CNVD-2017-02616 // VULHUB: VHN-114614 // BID: 41478 // BID: 96560 // JVNDB: JVNDB-2017-002114 // PACKETSTORM: 141390 // CNNVD: CNNVD-201703-015 // NVD: CVE-2017-6411

CREDITS

B GOVIND

Trust: 0.4

sources: BID: 96560 // PACKETSTORM: 141390

SOURCES

db:CNVDid:CNVD-2017-02616
db:VULHUBid:VHN-114614
db:BIDid:41478
db:BIDid:96560
db:JVNDBid:JVNDB-2017-002114
db:PACKETSTORMid:141390
db:CNNVDid:CNNVD-201703-015
db:NVDid:CVE-2017-6411

LAST UPDATE DATE

2024-11-23T22:18:03.618000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-02616date:2017-03-11T00:00:00
db:VULHUBid:VHN-114614date:2017-03-08T00:00:00
db:BIDid:41478date:2010-07-05T00:00:00
db:BIDid:96560date:2017-03-07T00:15:00
db:JVNDBid:JVNDB-2017-002114date:2017-03-29T00:00:00
db:CNNVDid:CNNVD-201703-015date:2023-04-27T00:00:00
db:NVDid:CVE-2017-6411date:2024-11-21T03:29:42.930

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-02616date:2017-03-11T00:00:00
db:VULHUBid:VHN-114614date:2017-03-06T00:00:00
db:BIDid:41478date:2010-07-05T00:00:00
db:BIDid:96560date:2017-03-06T00:00:00
db:JVNDBid:JVNDB-2017-002114date:2017-03-29T00:00:00
db:PACKETSTORMid:141390date:2017-03-01T10:11:11
db:CNNVDid:CNNVD-201703-015date:2017-03-02T00:00:00
db:NVDid:CVE-2017-6411date:2017-03-06T06:59:00.317