Starry Station (aka Starry Router) sets the Access-Control-Allow-Origin header to "*". This allows any hosted file on any domain to make calls to the device's webserver and brute force the credentials and pull any information that is stored on the device. In this case, a user's Wi-Fi credentials are stored in clear text on the device and can be pulled easily.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/153240/Starry-Router-Camera-PIN-Brute-Force-CORS-Incorrect.html | Third Party Advisory VDB Entry |
https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Starry_sec_issues.pdf | Exploit Third Party Advisory |
https://seclists.org/bugtraq/2019/Jun/8 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/153240/Starry-Router-Camera-PIN-Brute-Force-CORS-Incorrect.html | Third Party Advisory VDB Entry |
https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Starry_sec_issues.pdf | Exploit Third Party Advisory |
https://seclists.org/bugtraq/2019/Jun/8 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/153240/Starry-Router-Camera-PIN-Brute-Force-CORS-Incorrect.html - Third Party Advisory, VDB Entry | |
References | () https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Starry_sec_issues.pdf - Exploit, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2019/Jun/8 - Mailing List, Third Party Advisory |
Information
Published : 2019-06-10 22:29
Updated : 2024-11-21 03:11
NVD link : CVE-2017-13717
Mitre link : CVE-2017-13717
CVE.ORG link : CVE-2017-13717
JSON object : View
Products Affected
starry
- s00111
- s00111_firmware
CWE
CWE-255
Credentials Management Errors