who do I report an exploit to?

Post new topic   Reply to topic    DD-WRT Forum Index -> Generic Questions
Author Message
ChinkInArmor
DD-WRT Novice


Joined: 22 Feb 2014
Posts: 3

PostPosted: Sun Feb 23, 2014 19:03    Post subject: who do I report an exploit to? Reply with quote
I discovered a root level exploit in at least 20780. Who do I tell? I sent a message to Eko, but I feel I need to tell other devs.
Sponsor
ChinkInArmor
DD-WRT Novice


Joined: 22 Feb 2014
Posts: 3

PostPosted: Sun Feb 23, 2014 23:33    Post subject: still there Reply with quote
I decided to upgrade to build 23598. The vuln still works there too. Shocked
<Kong>
DD-WRT Guru


Joined: 15 Dec 2010
Posts: 4339
Location: Germany

PostPosted: Thu Feb 27, 2014 10:16    Post subject: Reply with quote
Regarding an possible exploit.

There is no exploit in 20780 or 23598.

ChinkInArmour presented a script which could be used to manipulate the router in case the user leaves an authenticated browser session open.
The so called "exploit" required that the user logs on to the routers webif via http not https, keeps the browser open and surfs to a website that includes malicous code.

Not all browser combos are affected by this as they protect users through ABE mechanism.

There are several ways to use an open browser session to manipulate a router, e.g. by surfing to a site in another tab, that includes malicous code in order to access the routers webif. Another way is, that you leave your pc unattended while still have the browser open and some dude plays with it. Also possible, a malicous software on a client computer that will use the browsers session and send commands to the browser while hidding a browser window.

In order to make it more difficult for such an attack newer builds will now require a re login for config changes after some inactivity.

To completely avoid such attacks you:

-access the webif either through https or an ssh tunnel

-or close the browser after you have configured the router

-run antivirus/firewall software on the client computer (that is used for configuring the router) ,that can detect message hooks to a browser

_________________
KONG PB's: http://www.desipro.de/ddwrt/
KONG Info: http://tips.desipro.de/
BrainSlayer
Site Admin


Joined: 06 Jun 2006
Posts: 7492
Location: Dresden, Germany

PostPosted: Wed Mar 05, 2014 16:38    Post subject: Reply with quote
and this script must be run locally since cross site attacks will not work in that way. the dd-wrt webserver does detect cross site actions
_________________
"So you tried to use the computer and it started smoking? Sounds like a Mac to me.." - Louis Rossmann https://www.youtube.com/watch?v=eL_5YDRWqGE&t=60s
ChinkInArmor
DD-WRT Novice


Joined: 22 Feb 2014
Posts: 3

PostPosted: Wed Mar 05, 2014 20:29    Post subject: Reply with quote
The webserver only detects cross site attacks by checking the referer field. That's what the "norefere" and "about:blank" parts were all about. But hey, the devs said this isn't an issue.

As for the reason why I gave it the standard 192.168.1.1, it was a proof of concept, not the end all be all of exploitation.

If you want to keep beating a dead horse, feel free and keep posting here why my code was worthless. It really helps my self esteem.
Newbrain
DD-WRT User


Joined: 28 Dec 2013
Posts: 172

PostPosted: Wed Mar 05, 2014 20:36    Post subject: Full disclosure Reply with quote
As the exploit is deemed to be a non-issue, I would think full disclosure would be beneficial to everyone.

It would allow everyone to see the findings, and verify the mitigations.

TIA
/NewBrain
Newbrain
DD-WRT User


Joined: 28 Dec 2013
Posts: 172

PostPosted: Wed Mar 05, 2014 20:39    Post subject: On another note... Reply with quote
I'm currently more worried about GnuTLS...

/NewBrain
Newbrain
DD-WRT User


Joined: 28 Dec 2013
Posts: 172

PostPosted: Wed Mar 05, 2014 20:41    Post subject: Reply with quote
<Kong> wrote:
Regarding an possible exploit.

To completely avoid such attacks you:

-access the webif either through https or an ssh tunnel

-or close the browser after you have configured the router

-run antivirus/firewall software on the client computer (that is used for configuring the router) ,that can detect message hooks to a browser


To flog a dead horse, I would say do all three all the time! + Implement the timeout Smile

/NewBrain
BrainSlayer
Site Admin


Joined: 06 Jun 2006
Posts: 7492
Location: Dresden, Germany

PostPosted: Fri Mar 14, 2014 10:01    Post subject: Re: On another note... Reply with quote
Newbrain wrote:
I'm currently more worried about GnuTLS...

/NewBrain


thats good. dd-wrt does not use gnutls in any way

_________________
"So you tried to use the computer and it started smoking? Sounds like a Mac to me.." - Louis Rossmann https://www.youtube.com/watch?v=eL_5YDRWqGE&t=60s
Newbrain
DD-WRT User


Joined: 28 Dec 2013
Posts: 172

PostPosted: Fri Mar 14, 2014 11:01    Post subject: Re: On another note... Reply with quote
BrainSlayer wrote:
Newbrain wrote:
I'm currently more worried about GnuTLS...

/NewBrain


thats good. dd-wrt does not use gnutls in any way


But Debian does (See my Avatar Smile
<Kong>
DD-WRT Guru


Joined: 15 Dec 2010
Posts: 4339
Location: Germany

PostPosted: Mon Mar 17, 2014 10:30    Post subject: Reply with quote
ChinkInArmor wrote:
The webserver only detects cross site attacks by checking the referer field. That's what the "norefere" and "about:blank" parts were all about. But hey, the devs said this isn't an issue.

As for the reason why I gave it the standard 192.168.1.1, it was a proof of concept, not the end all be all of exploitation.

If you want to keep beating a dead horse, feel free and keep posting here why my code was worthless. It really helps my self esteem.


Although the sample code given wasn't very sofisticated it is still possible to improve it and then it would cause trouble:-)

But I'm already working on the improved protection, that will also avoid a lot of re auths.

_________________
KONG PB's: http://www.desipro.de/ddwrt/
KONG Info: http://tips.desipro.de/
Display posts from previous:    Page 1 of 1
Post new topic   Reply to topic    DD-WRT Forum Index -> Generic Questions All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You can attach files in this forum
You can download files in this forum