CVE-2005-0112
CVSS5.0
发布时间 :2005-04-14 00:00:00
修订时间 :2008-09-05 16:45:21
NMCOPS    

[原文]The web-based administrative interface for 3Com OfficeConnect Wireless 11g Access Point (AP) 1.00.08, and possibly earlier versions before 1.03.07A, allows remote attackers to bypass authentication and obtain sensitive information by directly accessing the (1) config.bin (2) profile.wlp?PN=ggg or (3) event.logs URLs.


[CNNVD]3Com OfficeConnect无线11g AP信息泄露漏洞(CNNVD-200504-038)

        3Com OfficeConnect Wireless 11g Access Point是一款支持11g协议的无线路由器。
        3Com OfficeConnect无线AP在处理接口访问时存在问题,远程攻击者可以利用这个漏洞获得路由器敏感信息。
        3Com OfficeConnect无线AP通过WEB服务器在80口提供管理接口,这个接口默认可由内部以太接口和无线接口访问,问题是对部分脚本的访问缺少充分权限验证,提交如下URL请求可获得设备敏感信息:
         /main/config.bin
         /main/profile.wlp?PN=ggg
         /main/event.logs
        这些URL会泄露管理员用户名和密码,WEP KEY和SSID。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/h:3com:3crwe454g72:1.0.3.53Com 3Com OfficeConnect Wireless11g Access Point 3CRWE454G72 1.0.3.5
cpe:/h:3com:3crwe454g72:1.0.2.113Com 3Com OfficeConnect Wireless11g Access Point 3CRWE454G72 1.0.2.11
cpe:/h:3com:3crwe454g72:1.0.23Com 3Com OfficeConnect Wireless11g Access Point 3CRWE454G72 1.0.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0112
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0112
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200504-038
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/18994
(VENDOR_ADVISORY)  XF  3com-officeconnect-information-disclosure(18994)
http://www.securityfocus.com/bid/12322
(VENDOR_ADVISORY)  BID  12322
http://www.idefense.com/application/poi/display?id=188&type=vulnerabilities
(VENDOR_ADVISORY)  IDEFENSE  20050120 3Com OfficeConnect Wireless 11g AP Information Disclosure Vulnerability
http://securitytracker.com/id?1012958
(UNKNOWN)  SECTRACK  1012958
http://secunia.com/advisories/13942
(UNKNOWN)  SECUNIA  13942

- 漏洞信息

3Com OfficeConnect无线11g AP信息泄露漏洞
中危 访问验证错误
2005-04-14 00:00:00 2005-10-20 00:00:00
远程  
        3Com OfficeConnect Wireless 11g Access Point是一款支持11g协议的无线路由器。
        3Com OfficeConnect无线AP在处理接口访问时存在问题,远程攻击者可以利用这个漏洞获得路由器敏感信息。
        3Com OfficeConnect无线AP通过WEB服务器在80口提供管理接口,这个接口默认可由内部以太接口和无线接口访问,问题是对部分脚本的访问缺少充分权限验证,提交如下URL请求可获得设备敏感信息:
         /main/config.bin
         /main/profile.wlp?PN=ggg
         /main/event.logs
        这些URL会泄露管理员用户名和密码,WEP KEY和SSID。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.3com.com/products/en_US/result.jsp?selected=6&sort=effdt&order=desc&sku=3CRWE454G72

- 漏洞信息 (F35852)

iDEFENSE Security Advisory 2005-01-20.t (PacketStormID:F35852)
2005-01-25 00:00:00
Patrik Karlsson,iDefense Labs  idefense.com
advisory,remote
CVE-2005-0112
[点击下载]

iDEFENSE Security Advisory 01.20.05 - Remote exploitation of an input validation vulnerability in 3Com Corp.'s OfficeConnect Wireless 11g Access Point allows attackers to glean sensitive router information.

3Com OfficeConnect Wireless 11g AP Information Disclosure Vulnerability

iDEFENSE Security Advisory 01.20.05
www.idefense.com/application/poi/display?id=188&type=vulnerabilities
January 20, 2005

I. BACKGROUND

The 3Com OfficeConnect Wireless 11g Access Point provides users with
access to network resources, the Internet, and e-mail at speeds up to
54 Mbps and at distances up to 100 meters (328 feet). More information
about the product is available at 

    http://www.3com.com/products/en_US/detail.jsp?tab=features
        &pathtype=purchase&sku=3CRWE454G72

II. DESCRIPTION

Remote exploitation of an input validation vulnerability in 3Com Corp.'s
OfficeConnect Wireless 11g Access Point allows attackers to glean
sensitive router information.

The 3Com OfficeConnect Wireless 11g Access Point (AP) provides an
administrative interface via a web server accessible on port 80. This
interface is exposed by default on the internal ethernet interface and
the wireless interface, and it is also possible to expose it on the
external ethernet interface. The problem specifically exists due to
insufficient privilege checks when accessing various URLs without going
through the formal logon process. An unauthenticated attacker can glean
sensitive information from the device via the following URLs:

    /main/config.bin
    /main/profile.wlp?PN=ggg
    /main/event.logs

These URLs will expose the administrative username and password in clear
text, the WEP key and SSID, and the router log file respectively.

III. ANALYSIS

Successful exploitation allows remote attackers to glean sensitive
router information, allowing the attacker to gain full control of the
device. Compromise of the Access Point (AP) allows an attacker to
potentially redirect traffic, access nodes behind the AP that are
otherwise unaddressable and potentially monitor traffic from a remote
location. This can lead to further compromise of other computers.

IV. DETECTION

It has been reported that firmware version 1.00.08 shipped on the 3Com
OfficeConnect Wireless 11g Access Point is vulnerable. It is suspected
that earlier versions are also vulnerable.

V. WORKAROUND

iDEFENSE is currently unaware of any workarounds for this issue.

VI. VENDOR RESPONSE

Firmware version 1.03.07A for 3CRWE454G72 has been released to addresses
the vulnerability.

   http://www.3com.com/products/en_US/result.jsp?selected=6&sort=effdt
      &order=desc&sku=3CRWE454G72

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
names CAN-2005-0112 to these issues. This is a candidate for inclusion
in the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

12/21/2004  Initial vendor notification - No response
01/06/2005  Secondary vendor notification
01/07/2005  Initial vendor response
01/20/2004  Public disclosure

IX. CREDIT

Patrik, cqure.net is credited with this discovery.

Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp

X. LEGAL NOTICES

Copyright (c) 2005 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
    

- 漏洞信息

13095
3Com OfficeConnect Wireless 11g AP Router Information Disclosure
Remote / Network Access, Wireless Vector Authentication Management, Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

OfficeConnect contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered due to an access control error allowing anyone to access certain hidden pages via the web interface, which will disclose administrative information resulting in a loss of confidentiality.

- 时间线

2005-01-20 2004-12-21
2005-01-20 Unknow

- 解决方案

Upgrade to version 1.03.07A or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds. Note: Subsequent testing suggests the patch for this issue did not make it into the initial 2.x tree.

- 相关参考

- 漏洞作者

- 漏洞信息

3Com OfficeConnect Wireless 11g Access Point 3CRWE454G72 Information Disclosure Vulnerability
Access Validation Error 12322
Yes No
2005-01-20 12:00:00 2009-07-12 10:06:00
This issue was discovered by Patrik, cqure.net.

- 受影响的程序版本

3Com OfficeConnect Wireless11g Access Point 3CRWE454G72 1.0 .03.05
3Com OfficeConnect Wireless11g Access Point 3CRWE454G72 1.0 .02.11
3Com OfficeConnect Wireless11g Access Point 3CRWE454G72 1.0 .02
3Com OfficeConnect Wireless11g Access Point 3CRWE454G72 1.0 .03.07A

- 不受影响的程序版本

3Com OfficeConnect Wireless11g Access Point 3CRWE454G72 1.0 .03.07A

- 漏洞讨论

It is reported that this issue arises due to an access validation error and may allow remote unauthorized attackers to gain access to sensitive hidden Web pages through the product's Web management interface.

3Com OfficeConnect Wireless 11g Access Point 3CRWE454G72 firmware versions prior to 1.03.07A are reported prone to this vulnerability.

- 漏洞利用

An exploit is not required.

- 解决方案

The vendor has released firmware version 1.03.07A to address this issue.


3Com OfficeConnect Wireless11g Access Point 3CRWE454G72 1.0 .03.05

3Com OfficeConnect Wireless11g Access Point 3CRWE454G72 1.0 .02.11

3Com OfficeConnect Wireless11g Access Point 3CRWE454G72 1.0 .02

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站