Security
Headlines
HeadlinesLatestCVEs

Source

Zero Science Lab

Sielco Analog FM Transmitter 2.12 Improper Access Control Change Admin Password

The application suffers from improper access control when editing users. A user with Read permissions can manipulate users, passwords and permissions by sending a single HTTP POST request with modified parameters and edit other users' names, passwords and permissions including admin password.

Zero Science Lab
#vulnerability#web#ios#git
Sielco Analog FM Transmitter 2.12 Remote Privilege Escalation

The application suffers from a privilege escalation vulnerability. A user with Read permissions can elevate his/her privileges by sending a HTTP POST request setting the parameter 'auth1' or 'auth2' or 'auth3' to integer value '1' for Write or '2' for Admin permissions.

Osprey Pump Controller 1.0.1 Unauthenticated Remote Code Execution Exploit

The controller suffers from an unauthenticated command injection vulnerability that allows system access with www-data permissions.

Osprey Pump Controller 1.0.1 Cross-Site Request Forgery

The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

Osprey Pump Controller 1.0.1 Authentication Bypass Credentials Modification

A vulnerability has been discovered in the web panel of Osprey pump controller that allows an unauthenticated attacker to create an account and bypass authentication, thereby gaining unauthorized access to the system. The vulnerability stems from a lack of proper authentication checks during the account creation process, which allows an attacker to create a user account without providing valid credentials. An attacker who successfully exploits this vulnerability can gain access to the pump controller's web panel, and cause disruption in operation, modify data, change other usernames and passwords, or even shut down the controller entirely.

Osprey Pump Controller 1.0.1 Unauthenticated Reflected XSS

Input passed to the GET parameter 'userName' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML/JS code in a user's browser session in context of an affected site.

Osprey Pump Controller 1.0.1 (eventFileSelected) Command Injection

The pump controller suffers from an unauthenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the 'eventFileSelected' HTTP GET parameter called by DataLogView.php, EventsView.php and AlarmsView.php scripts.

Osprey Pump Controller 1.0.1 (userName) Blind Command Injection

The pump controller suffers from an unauthenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the 'userName' HTTP POST parameter called by index.php script.

Osprey Pump Controller 1.0.1 (pseudonym) Semi-blind Command Injection

The pump controller suffers from an unauthenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the 'pseudonym' HTTP POST parameter called by index.php script.

Osprey Pump Controller 1.0.1 Administrator Backdoor Access

The controller has a hidden administrative account 'admin' that has the hardcoded password 'Mirage1234' that allows full access to the web management interface configuration. The user admin is not visible in Usernames and Passwords menu list (120) of the application and the password cannot be changed through any normal operation of the device. The backdoor lies in the /home/pi/Mirage/Mirage_ValidateSessionCode.x ELF binary.