Home / os / win7

[webapps / 0day] - D-Link Router Models Authentication Bypas

Posted on 03 December 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>D-Link Router Models Authentication Bypass Vulnerability | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='D-Link Router Models Authentication Bypass Vulnerability by Craig Heffner in webapps / 0day | Inj3ct0r 1337 - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var _gaq = _gaq || [];_gaq.push(["_setAccount", "UA-12725838-1"]);_gaq.push(["_setDomainName", "none"]);_gaq.push(["_setAllowLinker", true]);_gaq.push(["_trackPageview"]);(function(){var ga = document.createElement("script"); ga.type = "text/javascript"; ga.async = true;ga.src = ("https:" == document.location.protocol ? "https://ssl" : "http://www") + ".google-analytics.com/ga.js";var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(ga, s);})();</script></head><body><pre>======================================================== D-Link Router Models Authentication Bypass Vulnerability ======================================================== # Exploit Title: Multiple D-Link Router Authentication Bypass Vulnerabilities # Date: 12-01-2011 # Author: Craig Heffner, /dev/ttyS0 # Firmware Link: http://www.dlink.co.uk/ # Firmware Version(s): All # Tested on: DIR-300, DIR-320, DIR-615 revD Multiple D-Link routers that use a PHP based Web interface suffer from the same authentication bypass vulnerability which allows unprivileged users to view and modify administrative router settings. Further, even if remote administration is disabled this vulnerability can be exploited by a remote attacker via a CSRF attack. The vulnerability has been confirmed in the following routers: DIR-615 revD DIR-320 DIR-300 The following example URL will allow access to the router&#039;s main administrative Web page without authentication: http://192.168.0.1/bsc_lan.php?NO_NEED_AUTH=1&amp;AUTH_GROUP=0 For a more detailed description of the vulnerability, see: http://www.devttys0.com/wp-content/uploads/2010/12/dlink_php_vulnerability.pdf. Note that this vulnerability was independently discovered in the DIR-300 and subsequently reported by Karol Celin on 09-Nov-2010 [1]. [1] http://www.securityfocus.com/archive/1/514687/30/120/threaded # <a href='http://1337db.com/'>1337db.com</a> [2010-12-03]</pre></body></html>

 

TOP