After some playing around I've noticed something interesting during login phase: by sending wrong credentials, user is redirected on an error page with url http://ift.tt/1Xjglw3 http://ift.tt/1TT2ahu In order to see what's happening we must start the web server with the debug output enabled: httpd -o -p 666 -m -1 -v 5 and try again to login with wrong credentials. http://ift.tt/1Xjglw5 Arguments of "cli" parameter are passed directly to a binary that will execute that particular given command; the complete list of commands available are inside "/etc/ayecli/ayecli.cli" file. (among them there's a creepy "system halt" that will shutdown the router no matter what). Arguments are passed in a way that ayecli -c 'command-here' so the way to escape is to close, add a command and close again to neutralize "$" substitution with ' : ayecli -c 'command';injection'' that is: http://ift.tt/1TT2blm http://ift.tt/1XjgjEB it's also possible to retrieve admin password, wifi passphrase etc cheers, p@ql thanks to ps and fp
Source: Gmail -> IFTTT-> Blogger
No comments:
Post a Comment