ID

VAR-200803-0175


CVE

CVE-2008-1252


TITLE

b_banner.stm Vulnerable to getting logon password

Trust: 0.8

sources: JVNDB: JVNDB-2008-002824

DESCRIPTION

b_banner.stm (aka the login page) on the Deutsche Telekom Speedport W500 DSL router allows remote attackers to obtain the logon password by reading the pwd field in the HTML source. Speedport W500 is prone to an information-disclosure vulnerability. Exploiting this issue may allow an unauthenticated remote attacker to retrieve sensitive information that may lead to further attacks. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Speedport W500 b_banner.stm Password Disclosure SECUNIA ADVISORY ID: SA29414 VERIFY ADVISORY: http://secunia.com/advisories/29414/ CRITICAL: Moderately critical IMPACT: Security Bypass WHERE: >From local network OPERATING SYSTEM: T-Com Speedport W500 http://secunia.com/product/18002/ DESCRIPTION: A vulnerability has been reported in the Speedport W500 router, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to the login page (b_banner.stm) containing the password in plain text, which can be exploited to disclose the password and bypass the login mechanism. SOLUTION: Restrict access to the login page. PROVIDED AND/OR DISCOVERED BY: mutax ORIGINAL ADVISORY: http://www.gnucitizen.org/projects/router-hacking-challenge/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-1252 // JVNDB: JVNDB-2008-002824 // BID: 28382 // VULHUB: VHN-31377 // PACKETSTORM: 64796

AFFECTED PRODUCTS

vendor:deutsche telekommodel:speedport w500 dsl routerscope: - version: -

Trust: 1.4

vendor:deutsche telekommodel:speedport w500 dsl routerscope:eqversion:*

Trust: 1.0

vendor:t commodel:speedportscope:eqversion:500v

Trust: 0.3

sources: BID: 28382 // JVNDB: JVNDB-2008-002824 // CNNVD: CNNVD-200803-130 // NVD: CVE-2008-1252

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1252
value: HIGH

Trust: 1.0

NVD: CVE-2008-1252
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200803-130
value: CRITICAL

Trust: 0.6

VULHUB: VHN-31377
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-1252
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-31377
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-31377 // JVNDB: JVNDB-2008-002824 // CNNVD: CNNVD-200803-130 // NVD: CVE-2008-1252

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-31377 // JVNDB: JVNDB-2008-002824 // NVD: CVE-2008-1252

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200803-130

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-200803-130

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-002824

PATCH

title:Top Pageurl:http://www.t-online.de/

Trust: 0.8

sources: JVNDB: JVNDB-2008-002824

EXTERNAL IDS

db:NVDid:CVE-2008-1252

Trust: 2.8

db:BIDid:28382

Trust: 2.0

db:SECUNIAid:29414

Trust: 1.8

db:JVNDBid:JVNDB-2008-002824

Trust: 0.8

db:CNNVDid:CNNVD-200803-130

Trust: 0.7

db:BUGTRAQid:20080301 THE ROUTER HACKING CHALLENGE IS OVER!

Trust: 0.6

db:XFid:41128

Trust: 0.6

db:XFid:500

Trust: 0.6

db:VULHUBid:VHN-31377

Trust: 0.1

db:PACKETSTORMid:64796

Trust: 0.1

sources: VULHUB: VHN-31377 // BID: 28382 // JVNDB: JVNDB-2008-002824 // PACKETSTORM: 64796 // CNNVD: CNNVD-200803-130 // NVD: CVE-2008-1252

REFERENCES

url:http://www.gnucitizen.org/projects/router-hacking-challenge/

Trust: 2.1

url:http://www.securityfocus.com/bid/28382

Trust: 1.7

url:http://secunia.com/advisories/29414

Trust: 1.7

url:http://www.securityfocus.com/archive/1/489009/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41128

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1252

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1252

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/489009/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/41128

Trust: 0.6

url:http://www2.dsl.t-online.de

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/advisories/29414/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/18002/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-31377 // BID: 28382 // JVNDB: JVNDB-2008-002824 // PACKETSTORM: 64796 // CNNVD: CNNVD-200803-130 // NVD: CVE-2008-1252

CREDITS

mutax

Trust: 0.9

sources: BID: 28382 // CNNVD: CNNVD-200803-130

SOURCES

db:VULHUBid:VHN-31377
db:BIDid:28382
db:JVNDBid:JVNDB-2008-002824
db:PACKETSTORMid:64796
db:CNNVDid:CNNVD-200803-130
db:NVDid:CVE-2008-1252

LAST UPDATE DATE

2025-04-10T20:38:02.508000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-31377date:2018-10-11T00:00:00
db:BIDid:28382date:2008-03-25T14:19:00
db:JVNDBid:JVNDB-2008-002824date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200803-130date:2008-09-05T00:00:00
db:NVDid:CVE-2008-1252date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-31377date:2008-03-10T00:00:00
db:BIDid:28382date:2008-03-21T00:00:00
db:JVNDBid:JVNDB-2008-002824date:2012-06-26T00:00:00
db:PACKETSTORMid:64796date:2008-03-21T22:21:24
db:CNNVDid:CNNVD-200803-130date:2008-03-10T00:00:00
db:NVDid:CVE-2008-1252date:2008-03-10T17:44:00