[ITERIS] - Vantage Velocity Field Unit - Multiple Stored XSS vulnerabilities - (CVE-2020-9025)
I continue with the research on ITERIS devices, in this case on the same "Vantage Velocity Field Unit". This time, I started placing some requests by injecting one or another javascript code to see what was coming out.
I found that in the "loaddata.py" function that I only found in version 2.4.2 devices, I can inject malicious code into several of its parameters and can do XSS attacks. The most interesting thing is that the XSS that was found is stored, which makes it even better. In addition, on this function, there is a button called "Star Data Viewver", which is the one I used for the XSS. however , in the request sent the credentials of the admin of the device are shown, which at no time I have used, since the device does not ask for passwords, which I found curious.
First of all we go to the URL "http://SERVER_IP:8089/cgi-bin/loaddata.py"

We inject the "Javascript" code in any of the parameters of the request, since all are vulnerable.
The attack will be reflected in the following URLs once the request is sent with the modified javascript code
http://192.x.x.x:8089/cgi-bin/loaddata.py
http://192.x.x.x:8089/cgi-bin/awamconfig.py
Affected Version: 2.4.2
Affected Parameters:
- htmlBluetoothReaderId
- htmlDataOutputFile
- htmlMacAddressResendTimeSeconds
- htmlSelectEnableUdpOutput
- htmlUdpOutputHost
- htmlUdpOutputPort
- htmlSelectRestartOnCommFailure
- htmlSelectAnonymizeMacAddresses
- htmlWifiChannelScan
- htmlSelectEnableHeartbeatMessage
- htmlSelectEnableBluetoothCapture
- htmlSelectEnableWifiCapture
- htmlAuthenticate
- htmlLogin
- htmlPassword
- htmlLoggedIn
- HtmlBluetoothReaderId
- HtmlMacAddressResendTimeSeconds
- HtmlSelectEnableUdpOutput
- HtmlUdpOutputPort
- HtmlSelectRestartOnCommFailure
- HtmlSelectAnonymizeMacAddresses
- HtmlWifiChannelScan
- HtmlSelectEnableHeartbeatMessage
- HtmlSelectEnableBluetoothCapture
- HtmlSelectEnableWifiCapture
- HtmlAuthenticate
- HtmlLogin
- HtmlPassword
- HtmlLoggedIn
CVE-2020-9025
By: @Linuxmonr4
Comentarios
Publicar un comentario