Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cross Site Request Forgery in Netgear Router JNR1010 Version 1.0.0.24 #13

Open
cybersecurityworks opened this issue Jan 11, 2016 · 0 comments

Comments

@cybersecurityworks
Copy link
Owner

Details

Product Vendor: Netgear

Bug Name: Cross Site Request Forgery in Netgear Router JNR1010 Version 1.0.0.24

Software: Netgear Router Firmware

Version: 1.0.0.24

Last Updated: 10-06-2015

Homepage: http://netgear.com/

Severity High

Status: Fixed

POC Video URL: https://www.youtube.com/watch?v=tET-t-3h7TU

Description

Using this flaw, an attacker can cause victims to change any data the victim is allowed to change or perform any function the victim is authorized to use.

Proof of concept: (POC)

Created a forged request changing the value of any variable, here it is :InternetGatewayDevice.X_TWSZ-COM_URL_Filter.BlackList.1.URLvariable in the URL http://router-ip/cgi-bin/webproc and sent it to victim forcing him/her to click on the malicious link generated by an attacker with different session allows an attacker to change the settings of the victim’s router.

csrf-1-1

Figure 1: Blocked sites keywords before CSRF request sent to the victim

csrf-33
Figure 2: a CSRF Request is created by changing Block list URL variable

csrf-2 1
Figure 3: CSRF request is successfully submitted in the victims browser

Note: Similarly, we can manipulate any request and can force victim to access the link generated by the attacker to make changes to the router settings without victim’s knowledge.

Fix

Refer, https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)


Timeline

28/10/2015 – Discovered in Netgear Router Firmware Version 1.0.0.24
28/10//2015 - Reported to vendor through support option but, no response
30/10//2015 - Reported to vendor through another support option available here. But, again no response.
03/11/2015 - Finally, Technical Team started addressing about the issue after so many followups through phone/mail.
13/12/2015 - Vulnerability got fixed & case was closed.
30/12/2015 - Netgear Released updated Netgear Router JNR1010 version 1.0.0.32


Discovered by:
Sathish from Cyber Security Works Pvt Ltd

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant