SSD Advisory – NEXXT Authentication Bypass
Credit to Author: SSD / Maor Schwartz| Date: Sun, 17 Sep 2017 09:02:04 +0000
Want to get paid for a vulnerability similar to this one?
Contact us at: sxsxdx@xbxexyxoxnxdxsxexcxuxrxixtxy.xcom
Vulnerability Summary
The following advisory describes an authentication bypass found in NEXXT routers.
NEXXT Connectivity Solutions develops “state of the art networking devices that help connect people and things together, at home, the office and virtually everywhere”.
Credit
An independent security researcher, Netfairy, has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program
Vendor response
We tried to contact NEXXT since August 17 2017, repeated attempts to establish contact went unanswered. At this time there is no solution or workaround for these vulnerabilities.
Vulnerability details
User controlled input is not sufficiently sanitized and can be exploit by an attacker to bypass the authentication mechanism.
By changing the cookie, an attacker can bypass the login authentication mechanism and login as admin.
Proof of Concept
The setup for testing the PoC we will use Chrome Browser with EditThisCokie plugin.
Browse to the victim’s IP – http://IP:8080/login.asp
Add a new cookie: admin:language=en