Subscribe via feed.

ABB IDAL HTTP Server Authentication Bypass

Posted by deepcore on June 25, 2019 – 2:00 pm

The IDAL HTTP server CGI interface contains a URL, which allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. In the IDAL CGI interface, there is a URL (/cgi/loginDefaultUser), which will create a session in an authenticated state and return the session ID along with the username and plaintext password of the user. An attacker can then login with the provided credentials or supply the string ‘IDALToken=……’ in a cookie which will allow them to perform privileged operations such as restarting the service with /cgi/restart.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.