ABB IDAL HTTP Server Authentication Bypass
Posted by deepcore on June 25, 2019 – 2:00 pm
The IDAL HTTP server CGI interface contains a URL, which allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. In the IDAL CGI interface, there is a URL (/cgi/loginDefaultUser), which will create a session in an authenticated state and return the session ID along with the username and plaintext password of the user. An attacker can then login with the provided credentials or supply the string ‘IDALToken=……’ in a cookie which will allow them to perform privileged operations such as restarting the service with /cgi/restart.
Post a reply
You must be logged in to post a comment.