Skip to content

Commit e8f72cb

Browse files
author
David Davidson
authored
Create README.md
1 parent fd862df commit e8f72cb

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

FreeACS-Pwn/README.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
## FreeACS Pwn
2+
3+
This is the FreeACS exploit I disclosed during BSides Edinburgh.
4+
5+
Note, it is a horrible, disgusting, PoC. Not really "weaponized" or proper.
6+
7+
### Vulnerability Details
8+
FreeACS uses the "username" part of the HTTP Basic Authentication sent by a TR-069 client to the /tr069/ endpoint as part of the identifier for the CPE device that is connecting. It also completely fails to sanitize this user input. So by sending a CWMP NOTIFY message to the /tr069/ endpoint on the server, with an XSS payload in the username portion of the Basic Auth header, your XSS payload will end up inside the admin area, and fire when an admin logs in and looks at the registered devices.
9+
10+
We can then use a simple JS hook to add a new administrative user, granting us control over the ACS server.

0 commit comments

Comments
 (0)