Commit Graph

8 Commits (658e64c886e441dec9cdbd2cb8616f5b57aed574)

Author SHA1 Message Date
forgedhallpass 209538baa6 refactor: Description field uniformization
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
MostInterestingBotInTheWorld 6b7215c4b3
Dashboard Text Enhancements (#3886)
Text Enhancements
2022-03-11 10:27:47 -05:00
Brian Zebrowski a19bd14fee Modified most of the default_logins templates to output username and password fields consistently 2021-10-08 12:42:54 -04:00
sandeep b335b6a686 more updates 2021-09-22 16:09:21 +05:30
sandeep a58515594a misc update 2021-09-22 16:07:07 +05:30
Prince Chaddha 807920c0ac clean-up 2021-09-21 17:16:53 +05:30
sandeep 609705f676 removed extra headers not required for template 2021-09-08 17:47:19 +05:30
GwanYeong Kim 3bf1c929ed Create Hongdian Vulnerability
CVE-2021-28149 : Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file.

CVE-2021-28150 : Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi.

CVE-2021-28151 : Hongdian H8922 3.0.5 devices allow OS command injection via shell metacharacters into the ip-address (aka Destination) field to the tools.cgi ping command, which is accessible with the username guest and password guest.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-10 21:16:35 +09:00