ID:CVE-2019-5243
Description: The response headers of HG255s router's web interface is
misconfigured. For example: "X-Frame-Options" header have an irrelevant
"noopen" value. The correct value ("SAMEORIGIN") is written to
"X-XSS-Protection" section. Therefore, it's vulnerable to clickjacking
attacks.
Products or solutions and versions affected: HG255s, version:HG255sC163B029
Found By:Utku Sen
Technical Details:
When we send following GET request to the web application
GET / HTTP/1.1
Host: 192.168.1.1
It responds with:
HTTP/1.1 200 OK
Set-Cookie:
SessionID_R3=97R3fHP1v6x5hscP10EthMoy3wifoqprUCTb762yQFLTc0w..;
path=/; HttpOnly;
Cache-Control: no-cache
X-Frame-Options: noopen
X-XSS-Protection: SAMEORIGIN
Strict-Transport-Security: 1; mode=block
Date: Tue, 25 Dec 2018 14:15:56 GMT
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 8749
HTML...
In here, security headers are misconfigured. For example "X-Frame-Options"
can't have a value "noopen". It should be "SAMEORIGIN" but it's written as
"X-XSS-Protection" value. Also "X-XSS-Protection" headers value should be "1;
mode=block" which is written to "Strict-Transport-Security" header
Since X-Frame-Options header is misconfigured, this application is vulnerable
to Clickjacking attacks. Any website can load "http://192.168.1.1" and force
users to do malicious activities on their router panel.