ID

VAR-E-202009-0013


CVE

cve_id:CVE-2020-24034

Trust: 0.5

sources: PACKETSTORM: 159026

TITLE

Sagemcom F@ST 5280 Privilege Escalation

Trust: 0.5

sources: PACKETSTORM: 159026

DESCRIPTION

Sagemcom F@ST 5280 routers using firmware version 1.150.61, and possibly others, have an insecure deserialization vulnerability that allows any authenticated user to perform a privilege escalation to any other user. By making a request with valid sess_id, nonce, and ha1 values inside of the serialized session cookie, an attacker may alter the user value inside of this cookie, and assume the role and permissions of the user specified. By assuming the role of the user internal, which is inaccessible to end users by default, the attacker gains the permissions of the internal account, which includes the ability to flash custom firmware to the router, allowing the attacker to achieve a complete compromise.

Trust: 0.5

sources: PACKETSTORM: 159026

AFFECTED PRODUCTS

vendor:sagemcommodel:f@stscope:eqversion:5280

Trust: 0.5

sources: PACKETSTORM: 159026

EXPLOIT

<!--
# Exploit Title: Sagemcom router insecure deserialization > privilege
escalation
# Date: 08-31-2020
# Exploit Author: Ryan Delaney
# Author Contact: ryan.delaney () owasp org
# Author LinkedIn: https://www.linkedin.com/in/infosecrd/
# Vendor Homepage: https://sagemcom.com/en
# Software Link: N/A (F@ST 5280 firmware not published)
# Version: F@ST 5280 router, F/W 1.150.61, possibly others
# Tested on: F@ST 5280 router, F/W 1.150.61
# CVE: CVE-2020-24034

1. Description

Sagemcom F@ST 5280 routers using firmware version 1.150.61,
and possibly others, have an insecure deserialization vulnerability
that allows any authenticated user to perform a privilege escalation
to any other user. By making a request with valid sess_id, nonce,
and ha1 values inside of the serialized session cookie, an attacker may
alter the user value inside of this cookie, and assume the role and
permissions of the user specified. By assuming the role of the user
'internal', which is inaccessible to end users by default, the attacker
gains the permissions of the 'internal' account, which includes the
ability to flash custom firmware to the router, allowing the attacker
to achieve a complete compromise.

Note that the 'internal' account is disabled and hidden by default, and the
primary administrative account ('admin'), lacks the permission to
flash custom firmware to the device, meaning that an attacker
exploiting this vulnerability obtains access exceeding that of
the legitimate, authorized system administrator.

2. Proof of Concept

Log in as a valid user (default is admin:admin). Retrieve the 'session'
cookie. Simply change the only occurrence of the string "admin" within
the cookie to "internal", and make a new request with this modified cookie.
If you decode the cookie, you will note this is the 4th key value pair
inside of the cookie, where the key is "user", and the value is "admin".

3. Solution

This vulnerability is only exploitable with a valid existing session.
Changing the administrative password to a strong, non-default value,
and ensuring that TLS certificate has the correct fingerprint will
help prevent attackers from obtaining a valid existing session.

-->

Trust: 0.5

sources: PACKETSTORM: 159026

EXPLOIT HASH

LOCAL

SOURCE

md5: 2e29a279e3f0441a3a7d075a6b67e5ae
sha-1: c2b73ed6f1c912345d9939b391205811b38eac62
sha-256: b749b45a358358330f8fd5f3cec1a2eb0a30872b9d8f5cd95aaf47010c1890ef
md5: 2e29a279e3f0441a3a7d075a6b67e5ae

Trust: 0.5

sources: PACKETSTORM: 159026

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 159026

TAGS

tag:exploit

Trust: 0.5

sources: PACKETSTORM: 159026

CREDITS

Ryan Delaney

Trust: 0.5

sources: PACKETSTORM: 159026

EXTERNAL IDS

db:NVDid:CVE-2020-24034

Trust: 0.5

db:PACKETSTORMid:159026

Trust: 0.5

sources: PACKETSTORM: 159026

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-24034

Trust: 0.5

sources: PACKETSTORM: 159026

SOURCES

db:PACKETSTORMid:159026

LAST UPDATE DATE

2022-07-27T09:51:25.723000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:159026date:2020-09-01T18:12:27