lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CACL5i=S_9bPSq5WjxWjoO5E2kKyr+pn461=1Sj1N6nw2SM-j0A@mail.gmail.com> Date: Sat, 6 Mar 2021 12:20:14 +0530 From: Harsha Bhat <harshabhat91@...il.com> To: fulldisclosure@...lists.org Subject: [FD] Privilege Escalation in Emerson Smart Wireless Gateway 1420 4.6.59 Administrator Console Title: Privilege Escalation Product: Emerson Smart Wireless Gateway Vendor Homepage: http://emerson.com Vulnerable Version: 1420 4.6.59 CVE Number: CVE-2020-19417 Authors: Harsha Bhat Anish Mitra and Unmesh Guragol Timeline: 2019-08-02 Disclosed to the vendor 2019-08-22 Vendor confirmed that the vulnerability was identified internally and a fix was released in the latest version of firmware 1. Vulnerability Description Emerson Smart Wireless Gateway 1420 4.6.59 allows non-privileged users (such as the default account 'maint') to perform administrative tasks by sending specially crafted HTTP requests to the application. 2. PoC The PoC explained below is to perform an action accessible ideally only to an 'administrator' account Step 1: Using a proxy tool such as Burp Suite, capture an original request that sets the login banner on the device from a legitimate 'administrator' account. Step 2: Logout from the application and login with a low privilege user account such as 'maint'. This account does not have privileges to set the login banner. Step 3: Replay the original request from 'Step 1' after replacing session ID of 'administrator' account to that of 'maint' account. Observe that the application, without validating the permissions set for 'maint' account sets the login banner via the low-privilege account. 3. Solution The vendor provides an updated version of firmware which should be installed immediately. CAUTION - This message may contain privileged and confidential information intended only for the use of the addressee named above. If you are not the intended recipient of this message you are hereby notified that any use, dissemination, distribution or reproduction of this message is prohibited. If you have received this message in error please notify The Missing Link immediately. Any views expressed in this message are those of the individual sender and may not necessarily reflect the views of The Missing Link. _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists