Praetorian503 Posted February 12, 2013 Report Share Posted February 12, 2013 TP-LINK Admin Panel Multiple CSRF VulnerabilitiesAdvisory Name: Multiple Cross Site Request Forgery vulnerabilities inTP-LINK Admin PanelInternal Cybsec Advisory Id: 2013-0208-Multiple CSRF vulnerabilities inTP-LINKVulnerability Class: Cross Site Request Forgery (CSRF)Release Date: 02/08/2013Affected Applications: Firmware v3.13.6 Build 110923 Rel.53137n; otherversions may also be affected.Affected Platforms: WR2543ND or any running the vulnerable firmware.Local / Remote: RemoteSeverity: Medium ? CVSS: 4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N)Researcher: Juan Manuel GarciaVendor Status: Acknowedged / UnpatchedRelease Mode: User releasedReference to Vulnerability Disclosure Policy:http://www.cybsec.com/vulnerability_policy.pdfVulnerability Description:Multiple Cross Site Request Forgery vulnerabilities were found in TP-LINKAdmin Panel, because the application allows authorized users to performcertain actions via HTTP requests without making proper validity checks toverify the source of the requests. This can be exploited to performcertain actions with administrative privileges if a logged-in user visitsa malicious web site.Proof of Concepts:1) New Storage Sharing and FTP Server user:http://server/userRpm/NasUserAdvRpm.htm?nas_admin_pwd=hacker&nas_admin_confirm_pwd=hacker&nas_admin_authority=1&nas_admin_ftp=1&Modify=1&Save=Save2) Disable the Router's Stateful Inspection Firewall:http://server/userRpm/BasicSecurityRpm.htm?stat=983040&Save=SaveImpact:An affected user may unintentionally execute actions written by anattacker. In addition, an attacker may change router settings or gainunauthorized accessVendor Response:2012-10-10 ? Vulnerability is identified.2012-10-11 ? Vendor is contacted.2012-10-12 ? Vulnerability details are sent to vendor.2012-10-17 ? Vendor confirms vulnerability and states ?This vulnerabilityhas been escalated to our RD engineer but under current web serverframework it is hard to fix. Our engineer team will modify the web serverframework to fix this. Currently it is under process but will take time?.2012-10-25 ? Cybsec asks the vendor for the planned publication date forthe update.2012-10-26 ? Vendor states ?I have no detailed schedule yet?.2012-12-12 ? Cybsec asks if there are any news regarding the solution ofreported vulnerabilities.2012-12-12 ? Vendor states ?The fix of this reported vulnerability is notincluded in the last firmware upgrade because the web server frameworkchange is still under development?.2013-02-01 ? Cybsec tells the Vendor that the security advisory will bepublished on Wednesday February 6.2013-02-08 ? Having received no reply from TP-Link, vulnerability isreleased.Contact Information:For more information regarding the vulnerability feel free to contact theresearcher atjmgarcia <at> cybsec <dot> comAbout CYBSEC S.A. Security SystemsSince 1996, CYBSEC is engaged exclusively in rendering professionalservices specialized in Information Security. Their area of servicescovers Latin America, Spain and over 250 customers are a proof of theirprofessional life.To keep objectivity, CYBSEC S.A. does not represent, neither sell, nor isassociated with other software and/or hardware provider companies.Our services are strictly focused on Information Security, protecting ourclients from emerging security threats, maintaining their IT deploymentsavailable, safe, and reliable.Beyond professional services, CYBSEC is continuously researching newdefense and attack techniques and contributing with the security communitywith high quality information exchange.For more information, please visit www.cybsec.com(c) 2010 - CYBSEC S.A. Security SystemsSource: TP-LINK Admin Panel Multiple CSRF Vulnerabilities Quote Link to comment Share on other sites More sharing options...