← Advisories

Peplink NGxxx/LCxxx VPN-Firewall Open Redirect Vulnerability

Low
Advisory ID
ZSL-2016-5376
Release Date
29 November 2016
Vendor
Qingdao Xunbo Information Technology Co., Ltd. - http://www.peplink.net
Affected Version
PEPLINK NG300 VPN-Firewall, PEPLINK NG320-VPN-Firewall, PEPLINK NG500-VPN-Firewall, PEPLINK NG520-VPN-Firewall, PEPLINK LC500-VPN-Firewall
CVE
N/A
Tested On
nginx/1.2.9, VPN OS 2.6 UTM Base/027R12-newvpn-3.53r, VPNServer/027R12-vpn-b3.74r
Summary

The NG500 / 520 is a high-performance VPN server, which is suitable for small and medium enterprises to use as a VPN center. It is simple to deploy and high security. At the same time, NG500 / 520 products also integrates advanced firewall features to support access to computers by group, by region, according to the strategy, according to rules management; support office network and business network isolation to ensure data server security. At the same time, NG500 / NG520 support intelligent flow control function, can reserve bandwidth for VPN, to ensure the fluency of critical applications, to prevent network congestion.

The NG300 / 320 products are cost-effective VPN branch gateway products, support to drive the entire LAN access to the headquarters network to support LAN TO LAN interconnection. NG300 / 320 integrated online behavior management function, you can achieve P2P, QQ, MSN and other application control and site filtering and other functions, support QoS traffic priority control technology, VPN applications can reserve bandwidth to ensure the stability of remote enterprise data transmission.

Description

Input passed via the '_redirect' GET parameter via 'service.cgi' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

Proof of Concept
Disclosure Timeline
N/A
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
29.11.2016Initial release
08.12.2016Added reference [1], [2] and [3]