Subscribe via feed.
Archive for November, 2020

Rockwell FactoryTalk View SE SCADA Unauthenticated Remote Code Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a series of vulnerabilities to achieve unauthenticated remote code execution on the Rockwell FactoryTalk View SE SCADA product as the IIS user. The attack relies on the chaining of five separate vulnerabilities. The first vulnerability is an unauthenticated project copy request, the second is a directory traversal, and the third is […]

Vtiger CRM 7.0 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Vtiger CRM version 7.0 suffers from a persistent cross site scripting vulnerability.

Barco wePresent Hardcoded API Credentials

Posted by deepcore under exploit (No Respond)

Barco wePresent device firmware includes a hardcoded API account and password that is discoverable by inspecting the firmware image. A malicious actor could use this password to access authenticated, administrative functions in the API. Versions affected include 2.5.1.8, 2.5.0.25, 2.5.0.24, and 2.4.1.19.

Barco wePresent Admin Credential Exposure

Posted by deepcore under exploit (No Respond)

An attacker armed with hardcoded API credentials from KL-001-2020-004 (CVE-2020-28329) can issue an authenticated query to display the admin password for the main web user interface listening on port 443/tcp for Barco wePresent WiPG-1600W version 2.5.1.8.

Barco wePresent Authentication Bypass

Posted by deepcore under exploit (No Respond)

The Barco wePresent WiPG-1600W version 2.5.1.8 web interface does not use session cookies for tracking authenticated sessions. Instead, the web interface uses a “SEID” token that is appended to the end of URLs in GET requests. Thus the “SEID” would be exposed in web proxy logs and browser history. An attacker that is able to […]

Barco wePresent Undocumented SSH Interface

Posted by deepcore under exploit (No Respond)

Barco wePresent WiPG-1600W version 2.5.1.8 has an SSH daemon included in the firmware image. By default, the SSH daemon is disabled and does not start at system boot. The system initialization scripts read a device configuration file variable to see if the SSH daemon should be started. The web interface does not provide a visible […]

Barco wePresent Global Hardcoded Root SSH Password

Posted by deepcore under exploit (No Respond)

Barco wePresent WiPG-1600W versions 2.5.1.8, 2.5.0.25, 2.5.0.24, and 2.4.1.19 have a hardcoded root password hash included in the firmware image.

Barco wePresent Insecure Firmware Image

Posted by deepcore under exploit (No Respond)

Barco wePresent WiPG-1600W versions 2.5.1.8, 2.5.0.25, 2.5.0.24, and 2.4.1.19 have firmware that does not perform verification of digitally signed firmware updates and is susceptible to processing and installing modified/malicious images.

PESCMS TEAM 2.3.2 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

PESCMS TEAM version 2.3.2 suffers from multiple cross site scripting vulnerabilities.

xuucms 3 SQL Injection

Posted by deepcore under exploit (No Respond)

xuucms version 3 suffers from a remote SQL injection vulnerability.