nuclei-templates/http/misconfiguration/dlink-unauth-cgi-script.yaml

38 lines
1.2 KiB
YAML
Raw Permalink Normal View History

2024-04-09 17:17:44 +00:00
id: dlink-unauth-cgi-script
2024-04-10 06:00:03 +00:00
2024-04-09 17:17:44 +00:00
info:
name: D-Link DNS Series CGI Script - Unauthenticated
2024-04-09 17:31:33 +00:00
author: pussycat0x
2024-04-09 17:17:44 +00:00
severity: low
description: |
A vulnerability has been identified in the D-Link DNS series network storage devices, allowing for the exposure of sensitive device information to unauthorized actors. This vulnerability is due to an unauthenticated access flaw in the info.cgi script, which can be exploited via a simple HTTP GET request, affecting over 920,000 devices on the Internet.
reference:
- https://github.com/netsecfish/info_cgi
2024-09-10 09:08:16 +00:00
classification:
cpe: cpe:2.3:h:dlink:dns-345:*:*:*:*:*:*:*:*
2024-04-09 17:17:44 +00:00
metadata:
verified: true
max-request: 1
2024-09-10 08:22:50 +00:00
vendor: dlink
2024-09-10 09:08:16 +00:00
product: dns-345
fofa-query: "app=\"D_Link-DNS\""
2024-04-09 17:17:44 +00:00
tags: unauth,dlink,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/cgi-bin/info.cgi"
2024-04-10 06:09:42 +00:00
matchers-condition: and
2024-04-09 17:17:44 +00:00
matchers:
- type: word
words:
- "Product="
- "Version="
2024-04-10 06:00:03 +00:00
- "Model="
2024-04-09 17:17:44 +00:00
condition: and
- type: status
status:
- 200
2024-09-12 05:14:01 +00:00
# digest: 4a0a0047304502210091bff48919d5a4ae1258fd6a2202b4560831fa60ec7bac87831ed7607f249b81022065d91318c23fe94969eec1d4327eece3ac74efe0ca29b6a901dbced846cd9fc3:922c64590222798bb761d5b6d8e72950