D-Link WBR-1310 Cross-Site Scripting

D-Link WBR-1310 Cross-Site Scripting

Posted on Nov 15 2009   |  Plain text version

Summary

D-Link WBR-1310 Router is susceptible to XSS, allowing an attacker to change the Admins password...

Description

 D-LINK WBR-1310 CROSS-SITE SCRIPTING (XSS)
==========================================

Device:      D-Link Router
Model:       WBR-1310
Firmware: 4.00
Critical:      Low
Impact:      Change Admin Password
                    Take control of router
Websec Advisory:    ws10-04

(Other versions/models have not been tested)


  BACKGROUND
=======================

The D-Link WBR-1310 router, is susceptible to Cross-Site Scripting attacks (XSS). The ping IP parameter's input/output is not sanitized, therefore allowing execution of remote code on the victims browser.


   DESCRIPTION
=======================

Almost none, if any of the input/output parameters in the routers interface handle any validation on the data being passed to it. Futhermore, no password verification is performed when changing the Admin's password. Using these two weaknesses, it is possible to use JavaScript to change the Admin's password remotely.


    EXPLOIT / POC
=======================

http://192.168.0.1/tools_vct.php?pingIP=<script>alert(0)</script>
http://192.168.0.1/tools_vct.xgi?pingIP=<script>alert(0)</script>


  WORKAROUND
=======================

Don't browse untrusted websites while logged into your router.


   DISCLOSURE TIMELINE
=======================

2009/09/05 - Vulnerability discovered
2009/09/08 - Vendor contacted
2009/11/15 - Vulnerability disclosed


    REFERENCES
=======================

Websec - http://www.websec.ca

POC


Latest Blog Entries

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

New publication: Mastering the Nmap Scripting Engine
We invite you to learn more about the latest publication from our team, "Mastering the Nmap Scripting Engine".

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.