The NG500 / 520 is a high-performance VPN server, which is suitable for small and medium enterprises to use as a VPN center. It is simple to deploy and high security. At the same time, NG500 / 520 products also integrates advanced firewall features to support access to computers by group, by region, according to the strategy, according to rules management; support office network and business network isolation to ensure data server security. At the same time, NG500 / NG520 support intelligent flow control function, can reserve bandwidth for VPN, to ensure the fluency of critical applications, to prevent network congestion.
The NG300 / 320 products are cost-effective VPN branch gateway products, support to drive the entire LAN access to the headquarters network to support LAN TO LAN interconnection. NG300 / 320 integrated online behavior management function, you can achieve P2P, QQ, MSN and other application control and site filtering and other functions, support QoS traffic priority control technology, VPN applications can reserve bandwidth to ensure the stability of remote enterprise data transmission.
Description
Input passed via the '_redirect' GET parameter via 'service.cgi' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.
Vendor
Qingdao Xunbo Information Technology Co., Ltd. - <http://www.peplink.net>
Peplink NGxxx/LCxxx VPN-Firewall Open Redirect Vulnerability
Vendor: Qingdao Xunbo Information Technology Co., Ltd.
Product web page: http://www.peplink.net
Affected version: PEPLINK NG300 VPN-Firewall
PEPLINK NG320-VPN-Firewall
PEPLINK NG500-VPN-Firewall
PEPLINK NG520-VPN-Firewall
PEPLINK LC500-VPN-Firewall
Summary: The NG500 / 520 is a high-performance VPN server, which is suitable
for small and medium enterprises to use as a VPN center. It is simple to deploy
and high security. At the same time, NG500 / 520 products also integrates advanced
firewall features to support access to computers by group, by region, according to
the strategy, according to rules management; support office network and business
network isolation to ensure data server security. At the same time, NG500 / NG520
support intelligent flow control function, can reserve bandwidth for VPN, to ensure
the fluency of critical applications, to prevent network congestion.
The NG300 / 320 products are cost-effective VPN branch gateway products, support to
drive the entire LAN access to the headquarters network to support LAN TO LAN interconnection.
NG300 / 320 integrated online behavior management function, you can achieve P2P, QQ,
MSN and other application control and site filtering and other functions, support QoS
traffic priority control technology, VPN applications can reserve bandwidth to ensure
the stability of remote enterprise data transmission.
Desc: Input passed via the '_redirect' GET parameter via 'service.cgi' script is not
properly verified before being used to redirect users. This can be exploited to redirect
a user to an arbitrary website e.g. when a user clicks a specially crafted link to the
affected script hosted on a trusted domain.
Tested on: nginx/1.2.9
VPN OS 2.6 UTM Base/027R12-newvpn-3.53r
VPNServer/027R12-vpn-b3.74r
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2016-5376
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5376.php
24.09.2016
--
GET /service.cgi?_service=get+session&_redirect=http://zeroscience.mk&_sleep=3 HTTP/1.1
{"id": "ZSL-2016-5376", "bulletinFamily": "exploit", "title": "Peplink NGxxx/LCxxx VPN-Firewall Open Redirect Vulnerability", "description": "Title: Peplink NGxxx/LCxxx VPN-Firewall Open Redirect Vulnerability \nAdvisory ID: [ZSL-2016-5376](<ZSL-2016-5376.php>) \nType: Local/Remote \nImpact: Spoofing \nRisk: (2/5) \nRelease Date: 29.11.2016 \n\n\n##### Summary\n\nThe NG500 / 520 is a high-performance VPN server, which is suitable for small and medium enterprises to use as a VPN center. It is simple to deploy and high security. At the same time, NG500 / 520 products also integrates advanced firewall features to support access to computers by group, by region, according to the strategy, according to rules management; support office network and business network isolation to ensure data server security. At the same time, NG500 / NG520 support intelligent flow control function, can reserve bandwidth for VPN, to ensure the fluency of critical applications, to prevent network congestion. \n \nThe NG300 / 320 products are cost-effective VPN branch gateway products, support to drive the entire LAN access to the headquarters network to support LAN TO LAN interconnection. NG300 / 320 integrated online behavior management function, you can achieve P2P, QQ, MSN and other application control and site filtering and other functions, support QoS traffic priority control technology, VPN applications can reserve bandwidth to ensure the stability of remote enterprise data transmission. \n\n##### Description\n\nInput passed via the '_redirect' GET parameter via 'service.cgi' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain. \n\n##### Vendor\n\nQingdao Xunbo Information Technology Co., Ltd. - <http://www.peplink.net>\n\n##### Affected Version\n\nPEPLINK NG300 VPN-Firewall \nPEPLINK NG320-VPN-Firewall \nPEPLINK NG500-VPN-Firewall \nPEPLINK NG520-VPN-Firewall \nPEPLINK LC500-VPN-Firewall \n\n##### Tested On\n\nnginx/1.2.9 \nVPN OS 2.6 UTM Base/027R12-newvpn-3.53r \nVPNServer/027R12-vpn-b3.74r \n\n##### Vendor Status\n\nN/A \n\n##### PoC\n\n[peplink_or.txt](<../../codes/peplink_or.txt>)\n\n##### Credits\n\nVulnerability discovered by Gjoko Krstic - <[gjoko@zeroscience.mk](<mailto:gjoko@zeroscience.mk>)>\n\n##### References\n\n[1] <https://packetstormsecurity.com/files/139947/> \n[2] <https://cxsecurity.com/issue/WLB-2016110242> \n[3] <https://exchange.xforce.ibmcloud.com/vulnerabilities/119297>\n\n##### Changelog\n\n[29.11.2016] - Initial release \n[08.12.2016] - Added reference [1], [2] and [3] \n\n##### Contact\n\nZero Science Lab \n \nWeb: <http://www.zeroscience.mk> \ne-mail: [lab@zeroscience.mk](<mailto:lab@zeroscience.mk>)\n", "published": "2016-11-29T00:00:00", "modified": "2016-11-29T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://zeroscience.mk/en/vulnerabilities/ZSL-2016-5376.php", "reporter": "Gjoko Krstic", "references": [], "cvelist": [], "type": "zeroscience", "lastseen": "2020-11-06T21:17:50", "edition": 12, "viewCount": 36, "enchantments": {"dependencies": {"references": [{"type": "packetstorm", "idList": ["PACKETSTORM:139947"]}], "modified": "2020-11-06T21:17:50", "rev": 2}, "score": {"value": -0.4, "vector": "NONE", "modified": "2020-11-06T21:17:50", "rev": 2}, "vulnersScore": -0.4}, "sourceHref": "http://zeroscience.mk/en/vulnerabilities/../../codes/peplink_or.txt", "sourceData": "\nPeplink NGxxx/LCxxx VPN-Firewall Open Redirect Vulnerability\n\n\nVendor: Qingdao Xunbo Information Technology Co., Ltd.\nProduct web page: http://www.peplink.net\nAffected version: PEPLINK NG300 VPN-Firewall\n PEPLINK NG320-VPN-Firewall\n PEPLINK NG500-VPN-Firewall\n PEPLINK NG520-VPN-Firewall\n PEPLINK LC500-VPN-Firewall\n\nSummary: The NG500 / 520 is a high-performance VPN server, which is suitable\nfor small and medium enterprises to use as a VPN center. It is simple to deploy\nand high security. At the same time, NG500 / 520 products also integrates advanced\nfirewall features to support access to computers by group, by region, according to\nthe strategy, according to rules management; support office network and business\nnetwork isolation to ensure data server security. At the same time, NG500 / NG520\nsupport intelligent flow control function, can reserve bandwidth for VPN, to ensure\nthe fluency of critical applications, to prevent network congestion. \n\nThe NG300 / 320 products are cost-effective VPN branch gateway products, support to\ndrive the entire LAN access to the headquarters network to support LAN TO LAN interconnection.\nNG300 / 320 integrated online behavior management function, you can achieve P2P, QQ,\nMSN and other application control and site filtering and other functions, support QoS\ntraffic priority control technology, VPN applications can reserve bandwidth to ensure\nthe stability of remote enterprise data transmission.\n\nDesc: Input passed via the '_redirect' GET parameter via 'service.cgi' script is not\nproperly verified before being used to redirect users. This can be exploited to redirect\na user to an arbitrary website e.g. when a user clicks a specially crafted link to the\naffected script hosted on a trusted domain.\n\nTested on: nginx/1.2.9\n VPN OS 2.6 UTM Base/027R12-newvpn-3.53r\n VPNServer/027R12-vpn-b3.74r\n\n\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\n @zeroscience\n\n\nAdvisory ID: ZSL-2016-5376\nAdvisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5376.php\n\n\n24.09.2016\n\n--\n\n\nGET /service.cgi?_service=get+session&_redirect=http://zeroscience.mk&_sleep=3 HTTP/1.1\n", "scheme": null}
{"packetstorm": [{"lastseen": "2016-11-29T20:47:26", "description": "", "published": "2016-11-29T00:00:00", "type": "packetstorm", "title": "Peplink NGxxx/LCxxx VPN-Firewall Open Redirect", "bulletinFamily": "exploit", "cvelist": [], "modified": "2016-11-29T00:00:00", "id": "PACKETSTORM:139947", "href": "https://packetstormsecurity.com/files/139947/Peplink-NGxxx-LCxxx-VPN-Firewall-Open-Redirect.html", "sourceData": "` \nPeplink NGxxx/LCxxx VPN-Firewall Open Redirect Vulnerability \n \n \nVendor: Qingdao Xunbo Information Technology Co., Ltd. \nProduct web page: http://www.peplink.net \nAffected version: PEPLINK NG300 VPN-Firewall \nPEPLINK NG320-VPN-Firewall \nPEPLINK NG500-VPN-Firewall \nPEPLINK NG520-VPN-Firewall \nPEPLINK LC500-VPN-Firewall \n \nSummary: The NG500 / 520 is a high-performance VPN server, which is suitable \nfor small and medium enterprises to use as a VPN center. It is simple to deploy \nand high security. At the same time, NG500 / 520 products also integrates advanced \nfirewall features to support access to computers by group, by region, according to \nthe strategy, according to rules management; support office network and business \nnetwork isolation to ensure data server security. At the same time, NG500 / NG520 \nsupport intelligent flow control function, can reserve bandwidth for VPN, to ensure \nthe fluency of critical applications, to prevent network congestion. \n \nThe NG300 / 320 products are cost-effective VPN branch gateway products, support to \ndrive the entire LAN access to the headquarters network to support LAN TO LAN interconnection. \nNG300 / 320 integrated online behavior management function, you can achieve P2P, QQ, \nMSN and other application control and site filtering and other functions, support QoS \ntraffic priority control technology, VPN applications can reserve bandwidth to ensure \nthe stability of remote enterprise data transmission. \n \nDesc: Input passed via the '_redirect' GET parameter via 'service.cgi' script is not \nproperly verified before being used to redirect users. This can be exploited to redirect \na user to an arbitrary website e.g. when a user clicks a specially crafted link to the \naffected script hosted on a trusted domain. \n \nTested on: nginx/1.2.9 \nVPN OS 2.6 UTM Base/027R12-newvpn-3.53r \nVPNServer/027R12-vpn-b3.74r \n \n \nVulnerability discovered by Gjoko 'LiquidWorm' Krstic \n@zeroscience \n \n \nAdvisory ID: ZSL-2016-5376 \nAdvisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5376.php \n \n \n24.09.2016 \n \n-- \n \n \nGET /service.cgi?_service=get+session&_redirect=http://zeroscience.mk&_sleep=3 HTTP/1.1 \n`\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://packetstormsecurity.com/files/download/139947/ZSL-2016-5376.txt"}]}