Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:29540
HistoryJul 10, 2013 - 12:00 a.m.

Authentication bypass in D-Link devices (session cookies not validated)

2013-07-1000:00:00
vulners.com
14

Vendor: D-Link
Affected Products:
-DIR-505L SharePort Mobile Companion (HW: A1 / FW: 1.01)
-DIR-826L Wireless N600 Cloud Router (HW: A1 / FW: 1.02)
Vendor Notification: April 8, 2013
Public Disclosure: July 8, 2013
Vulnerability Type: Authentication Bypass
CVE Reference: CVE-2013-4772
Solution Status: Not Fixed
Credit: Jason Doyle / tw: jasond0yle

Advisory Details:
It is possible to bypass authentication to gain administrator level access to the web management console by navigating directly to any web page while a legitimate session is still active. During this window of opportunity, session cookies are not validated and an attacker with or without a session cookie can gain unfettered access to view and change all configurable settings on the device, including the addition / modification of user accounts for persistent access. This is not possible once a legitimate session has expired.

Related for SECURITYVULNS:DOC:29540