{"id":11293,"date":"2018-01-29T14:19:03","date_gmt":"2018-01-29T22:19:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/29\/news-5064\/"},"modified":"2018-01-29T14:19:03","modified_gmt":"2018-01-29T22:19:03","slug":"news-5064","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/29\/news-5064\/","title":{"rendered":"SSD Advisory \u2013 iBall Multiple Vulnerabilities"},"content":{"rendered":"<p><strong>Credit to Author: SSD \/ Maor Schwartz| Date: Mon, 29 Jan 2018 09:07:45 +0000<\/strong><\/p>\n<div class=\"entry-content\">\n<p><strong>Want to get paid for a vulnerability similar to this one?<\/strong><br \/>Contact us at: <a href=\"mailto:sxsxd@bxexyxoxnxdxsxexcxuxrxixtxy.com\" onmouseover=\"this.href=this.href.replace(\/x\/g,'');\" id=\"a-href-3654\">sxsxdx@xbxexyxoxnxdxsxexcxuxrxixtxy.xcom<\/a><br \/><script>var obj = jQuery('#a-href-3654');if(obj[0]) { obj[0].innerText = obj[0].innerText.replace(\/x\/g, ''); }<\/script> See our full scope at: <a href=\"https:\/\/blogs.securiteam.com\/index.php\/product_scope\">https:\/\/blogs.securiteam.com\/index.php\/product_scope<\/a><\/p>\n<div class=\"pf-content\">\n<p>Vulnerabilities summary<br \/> The following advisory describes two (2) vulnerabilities found in iB-WRA150N devices, firmware 1.2.6 build 110401 Rel.47776n.<\/p>\n<p>iB-WRA150N is &#8220;a powerful solution to Internet connectivity at home, small offices and work stations. The key is if you are using an ADSL2+ connection now and later decide to change to Broadband or vice-versa you don\u2019t need to change your router. This iBall router is 2-in-1 and compatible to both \u2013 Broadband connection as well as ADSL2 connection (Telephone connection or cable operator connection). &#8221;<\/p>\n<p>The vulnerabilities found are:<\/p>\n<ul>\n<li>Hard coded accounts<\/li>\n<li>Remote command execution<\/li>\n<\/ul>\n<p><strong>Credit<\/strong><br \/> An independent security researcher, maxki4x, has reported this vulnerabilities to Beyond Security\u2019s SecuriTeam Secure Disclosure program.<\/p>\n<p><strong>Vendor response<\/strong><br \/> We tried to contact iBall since December 20 2017, repeated attempts to establish contact were answered, but no details have been provided on a solution or a workaround.<br \/> <span id=\"more-3654\"><\/span><br \/> <u><strong>Vulnerabilities details<\/strong><\/u><\/p>\n<p><strong>Hard coded accounts<\/strong><br \/> Username: admin<br \/> Password: admin<\/p>\n<p>Username: support<br \/> Password: support<\/p>\n<p>Username: user<br \/> Password: user<\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2018\/01\/iball1.jpg\" data-slb-active=\"1\" data-slb-asset=\"177238307\" data-slb-internal=\"0\" data-slb-group=\"3654\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2018\/01\/iball1-300x177.jpg\" alt=\"\" width=\"300\" height=\"177\" class=\"alignnone size-medium wp-image-3655\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2018\/01\/iball1-300x177.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2018\/01\/iball1.jpg 554w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><strong>Remote command execution<\/strong><br \/> After we logged in to the victims router &#8211; using the hard coded accounts, we can trigger the second vulnerability and achieve remote command execution. <\/p>\n<p>User controlled input is not sufficiently filtered, allowing user to inject arbitrary commands into ping test arguments in Diagnostics page.<\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2018\/01\/iball2.png\" data-slb-active=\"1\" data-slb-asset=\"578816030\" data-slb-internal=\"0\" data-slb-group=\"3654\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2018\/01\/iball2-300x132.png\" alt=\"\" width=\"300\" height=\"132\" class=\"alignnone size-medium wp-image-3656\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2018\/01\/iball2-300x132.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2018\/01\/iball2.png 476w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>By entering the following input in the ping test arguments in Diagnostics page, the attacker can get the \/etc\/passwd file:<\/p>\n<p><!-- Crayon Syntax Highlighter v_2.7.2_beta -->    \t\t<\/p>\n<div id=\"crayon-5a6f9dd77cd62689191633\" class=\"crayon-syntax crayon-theme-classic crayon-font-monaco crayon-os-pc print-yes notranslate\" data-settings=\" minimize scroll-mouseover\" style=\" margin-top: 12px; margin-bottom: 12px; font-size: 12px !important; line-height: 15px !important;\">\n<div class=\"crayon-toolbar\" data-settings=\" mouseover overlay hide delay\" style=\"font-size: 12px !important;height: 18px !important; line-height: 18px !important;\"><span class=\"crayon-title\"><\/span>  \t\t\t<\/p>\n<div class=\"crayon-tools\" style=\"font-size: 12px !important;height: 18px !important; line-height: 18px !important;\">\n<div class=\"crayon-button crayon-nums-button\" title=\"Toggle Line Numbers\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-plain-button\" title=\"Toggle Plain Code\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-wrap-button\" title=\"Toggle Line Wrap\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-expand-button\" title=\"Expand Code\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-copy-button\" title=\"Copy\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-popup-button\" title=\"Open Code In New Window\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"crayon-info\" style=\"min-height: 16.8px !important; line-height: 16.8px !important;\"><\/div>\n<div class=\"crayon-plain-wrap\"><textarea wrap=\"soft\" class=\"crayon-plain print-no\" data-settings=\"dblclick\" readonly style=\"-moz-tab-size:4; -o-tab-size:4; -webkit-tab-size:4; tab-size:4; font-size: 12px !important; line-height: 15px !important;\"> 127.0.0.1;cat\/etc\/passwd<\/textarea><\/div>\n<div class=\"crayon-main\" style=\"\">  \t\t\t\t  \t\t\t<\/div>\n<\/p><\/div>\n<p>  <!-- [Format Time: 0.0004 seconds] -->  <\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2018\/01\/iball3.jpg\" data-slb-active=\"1\" data-slb-asset=\"426848407\" data-slb-internal=\"0\" data-slb-group=\"3654\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2018\/01\/iball3-300x147.jpg\" alt=\"\" width=\"300\" height=\"147\" class=\"alignnone size-medium wp-image-3657\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2018\/01\/iball3-300x147.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2018\/01\/iball3.jpg 554w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<div class=\"printfriendly pf-alignleft\"><a href=\"#\" rel=\"nofollow\" onclick=\"window.print(); return false;\" class=\"noslimstat\" title=\"Printer Friendly, PDF &#038; Email\"><img decoding=\"async\" style=\"border:none;-webkit-box-shadow:none; box-shadow:none;\" src=\"https:\/\/cdn.printfriendly.com\/buttons\/printfriendly-button.png\" alt=\"Print Friendly, PDF &#038; Email\" \/><\/a><\/div>\n<\/div><\/div>\n<p><a href=\"https:\/\/blogs.securiteam.com\/index.php\/archives\/3654\" target=\"bwo\" >https:\/\/blogs.securiteam.com\/index.php\/feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2018\/01\/iball1-300x177.jpg\"\/><\/p>\n<p><strong>Credit to Author: SSD \/ Maor Schwartz| Date: Mon, 29 Jan 2018 09:07:45 +0000<\/strong><\/p>\n<p>Vulnerabilities summary The following advisory describes two (2) vulnerabilities found in iB-WRA150N devices, firmware 1.2.6 build 110401 Rel.47776n. iB-WRA150N is &#8220;a powerful solution to Internet connectivity at home, small offices and work stations. The key is if you are using an ADSL2+ connection now and later decide to change to Broadband or vice-versa you don\u2019t &#8230; <a href=\"https:\/\/blogs.securiteam.com\/index.php\/archives\/3654\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SSD Advisory \u2013 iBall Multiple Vulnerabilities<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10754],"tags":[16041,11851,10757],"class_list":["post-11293","post","type-post","status-publish","format-standard","hentry","category-independent","category-securiteam","tag-hard-coded-password","tag-remote-command-execution","tag-securiteam-secure-disclosure"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11293"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11293\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11293"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}