module

Peplink Balance routers SQLi

Disclosed
N/A
Created
Aug 28, 2020

Description

Firmware versions up to 7.0.0-build1904 of Peplink Balance routers are affected by an unauthenticated
SQL injection vulnerability in the bauth cookie, successful exploitation of the vulnerability allows an
attacker to retrieve the cookies of authenticated users, bypassing the web portal authentication.

By default, a session expires 4 hours after login (the setting can be changed by the admin), for this
reason, the module attempts to retrieve the most recently created sessions.

Authors

X41 D-Sec GmbH [email protected]
Redouane NIBOUCHA [email protected]

Platform

Linux

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/gather/peplink_bauth_sqli
msf auxiliary(peplink_bauth_sqli) > show actions
...actions...
msf auxiliary(peplink_bauth_sqli) > set ACTION < action-name >
msf auxiliary(peplink_bauth_sqli) > show options
...show and set options...
msf auxiliary(peplink_bauth_sqli) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.