Merge pull request #9533 from projectdiscovery/pussycat0x-patch-7

Create dlink-unauth-cgi-script.yaml
patch-1
Dhiyaneshwaran 2024-04-10 11:49:12 +05:30 committed by GitHub
commit a51fc4633b
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 32 additions and 0 deletions

View File

@ -0,0 +1,32 @@
id: dlink-unauth-cgi-script
info:
name: D-Link DNS Series CGI Script - Unauthenticated
author: pussycat0x
severity: low
description: |
A vulnerability has been identified in the D-Link DNS series network storage devices, allowing for the exposure of sensitive device information to unauthorized actors. This vulnerability is due to an unauthenticated access flaw in the info.cgi script, which can be exploited via a simple HTTP GET request, affecting over 920,000 devices on the Internet.
reference:
- https://github.com/netsecfish/info_cgi
metadata:
verified: true
fofa-query: app="D_Link-DNS"
tags: unauth,dlink,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/cgi-bin/info.cgi"
matchers-condition: and
matchers:
- type: word
words:
- "Product="
- "Version="
- "Model="
condition: and
- type: status
status:
- 200