Skip to content

Commit c8dddbf

Browse files
author
Michael Messner
committed
server header
1 parent 8bc012a commit c8dddbf

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

modules/exploits/linux/http/dlink_dspw110_cookie_noauth_exec.rb

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,7 @@ def initialize(info = {})
1818
This module exploits an anonymous remote upload and code execution vulnerability on different
1919
D-Link devices. The vulnerability is a command injection in the cookie handling process of the
2020
lighttpd web server when handling specially crafted cookie values. This module has been
21-
successfully tested on D-Link DSP-W110A1_FW105B01 in emulated environment and on the real
22-
device.
21+
successfully tested on D-Link DSP-W110A1_FW105B01 in emulated environment.
2322
},
2423
'Author' =>
2524
[
@@ -39,13 +38,13 @@ def initialize(info = {})
3938
},
4039
'Targets' =>
4140
[
42-
[ 'MIPS Little Endian',
41+
[ 'MIPS Little Endian', # unknown if there are LE devices out there ... but in case we have a target
4342
{
4443
'Platform' => 'linux',
4544
'Arch' => ARCH_MIPSLE
4645
}
4746
],
48-
[ 'MIPS Big Endian', # unknown if there are BE devices out there ... but in case we have a target
47+
[ 'MIPS Big Endian',
4948
{
5049
'Platform' => 'linux',
5150
'Arch' => ARCH_MIPSBE
@@ -63,7 +62,7 @@ def check
6362
'method' => 'GET',
6463
})
6564

66-
if res && res.headers["Server"] =~ /lighttpd\/1.4.34/
65+
if res && res.headers["Server"] =~ /lighttpd\/1\.4\.34/
6766
return Exploit::CheckCode::Detected
6867
end
6968
rescue ::Rex::ConnectionError

0 commit comments

Comments
 (0)