8.8 CVE-2016-6277
CISA Kev Catalog CSRF Used by Malware Patch Exploit

NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
https://nvd.nist.gov/vuln/detail/CVE-2016-6277
Categories
CWE-352 : Cross-Site Request Forgery (CSRF)
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. CSRF is currently difficult to detect reliably using automated techniques. This is because each application has its own implicit security policy that dictates which requests can be influenced by an outsider and automatically performed on behalf of a user, versus which requests require strong confidence that the user intends to make the request. For example, a keyword search of the public portion of a web site is typically expected to be encoded within a link that can be launched automatically when the user clicks on the link. Ensure that the application is free of cross-site scripting issues (CWE-79), because most CSRF defenses can be bypassed using attacker-controlled script. Generate a unique nonce for each form, place the nonce into the form, and verify the nonce upon receipt of the form. Be sure that the nonce is not predictable (CWE-330). [REF-332] Identify especially dangerous operations. When the user performs a dangerous operation, send a separate confirmation request to ensure that the user intended to perform that operation. Do not use the GET method for any request that triggers a state change. Check the HTTP Referer header to see if the request originated from an expected page. This could break legitimate functionality, because users or proxies may have disabled sending the Referer for privacy reasons. Add user accounts via a URL in an img tag Add user accounts via a URL in an img tag Arbitrary code execution by specifying the code in a crafted img tag or URL Gain administrative privileges via a URL in an img tag Delete a victim's information via a URL or an img tag Change another user's settings via a URL or an img tag Perform actions as administrator via a URL or an img tag modify password for the administrator CMS allows modification of configuration via CSRF attack against the administrator web interface allows password changes or stopping a virtual machine via CSRF
References
af854a3a-2127-422b-91ae-364da2661108 Patch Exploit
http://kb.netgear.com/000036386/CVE-2016-582384 Patch Vendor Advisory |
http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Executi... Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/94819 Broken Link Third Party Advisory VDB Entry |
http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r700... Broken Link Mitigation Third Party Advisory |
https://kalypto.org/research/netgear-vulnerability-expanded/ Broken Link Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/40889/ Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/41598/ Exploit Third Party Advisory VDB Entry |
https://www.kb.cert.org/vuls/id/582384 Third Party Advisory US Government Resource |
cve@mitre.org Patch Exploit
http://kb.netgear.com/000036386/CVE-2016-582384 Patch Vendor Advisory |
http://packetstormsecurity.com/files/155712/Netgear-R6400-Remote-Code-Executi... Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/94819 Broken Link Third Party Advisory VDB Entry |
http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r700... Broken Link Mitigation Third Party Advisory |
https://kalypto.org/research/netgear-vulnerability-expanded/ Broken Link Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/40889/ Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/41598/ Exploit Third Party Advisory VDB Entry |
https://www.kb.cert.org/vuls/id/582384 Third Party Advisory US Government Resource |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
AND | ||
cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:* | <= 1.0.0.22 | |
Running on/with | ||
cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:* | ||
Configuration 2 | ||
AND | ||
cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:* | <= 1.0.0.56 | |
Running on/with | ||
cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:* | ||
Configuration 3 | ||
AND | ||
cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:* | <= 1.0.4.6_10.1.12 | |
Running on/with | ||
cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:* | ||
Configuration 4 | ||
AND | ||
cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:* | <= 1.0.1.18 | |
Running on/with | ||
cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:* | ||
Configuration 5 | ||
AND | ||
cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:* | <= 1.0.1.14 | |
Running on/with | ||
cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:* | ||
Configuration 6 | ||
AND | ||
cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:* | <= 1.0.1.14 | |
Running on/with | ||
cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:* | ||
Configuration 7 | ||
AND | ||
cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:* | <= 1.0.7.2_1.1.93 | |
Running on/with | ||
cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:* | ||
Configuration 8 | ||
AND | ||
cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:* | <= 1.0.0.28 | |
Running on/with | ||
cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:* | ||
Configuration 9 | ||
AND | ||
cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:* | <= 1.0.0.46 | |
Running on/with | ||
cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:* | ||
Configuration 10 | ||
AND | ||
cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:* | <= 1.0.1.8 | |
Running on/with | ||
cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:* | ||
Configuration 11 | ||
AND | ||
cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:* | <= 1.0.3.26 | |
Running on/with | ||
cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:* |
REMEDIATION
Patch
Url |
---|
http://kb.netgear.com/000036386/CVE-2016-582384 |
http://kb.netgear.com/000036386/CVE-2016-582384 |
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
41598 | Netgear R7000 / R6400 - 'cgi-bin' Command Injection (Metasploit) | 2017-03-13 | |
40889 | Netgear R7000 - Command Injection | 2016-12-07 |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
111 | JSON Hijacking (aka JavaScript Hijacking) |
High |
462 | Cross-Domain Search Timing |
Medium |
467 | Cross Site Identification |
Low |
62 | Cross Site Request Forgery |
Very High |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.