Correction of the typo: "An authenticated user can visit the file dirary0.js" should be "An unauthenticated user can visit the file dirary0.js" ________________________________ From: Tyler Cui Sent: Monday, 17 December 2018 12:11 AM To: fulldisclosure@seclists.org Subject: [CVE-2018-18009] dirary0.js on D-Link DIR-140L, DIR-640L devices allows remote unauthenticated attackers to discover admin credentials
[Vendor] us.dlink.com [Product] DIR-140L (version 1.02) DIR-640L (version 1.01RU) Other versions might also be affected. [Vulnerability Type] admin credentials disclosure [Affected Component] Web Interface [CVE Reference] CVE-2018-18009 [Security Issue] An authenticated user can visit the file dirary0.js, for example, http://victime_ip/dirary0.js, and obtain clear text password of user admin at the line: gosave_ok = ("__password__".length < 6)?true:false [Network Access] Remote via Web Interface [Authentication] Not required [Disclosure Timeline] 2018-06-17: Vendor Notification 2018-06-19: Vendor acknowledgement 2018-10-23: Request update 2018-10-26: Vendor: "I don't have an update currently, but fixes are under development." 2018-12-07: Inform vendor of disclosure 2018-12-17: Public Disclosure _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/