René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

306 lines
9.2 KiB
JSON

{
"id": "CVE-2022-33174",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-06-13T18:15:10.230",
"lastModified": "2022-06-27T16:45:56.087",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Power Distribution Units running on Powertek firmware (multiple brands) before 3.30.30 allows remote authorization bypass in the web interface. To exploit the vulnerability, an attacker must send an HTTP packet to the data retrieval interface (/cgi/get_param.cgi) with the tmpToken cookie set to an empty string followed by a semicolon. This bypasses an active session authorization check. This can be then used to fetch the values of protected sys.passwd and sys.su.name fields that contain the username and password in cleartext."
},
{
"lang": "es",
"value": "Las unidades de distribuci\u00f3n de energ\u00eda que son ejecutadas con el firmware de Powertek (varias marcas) versiones anteriores a 3.30.30, permiten omitir la autorizaci\u00f3n remota en la interfaz web. Para explotar la vulnerabilidad, un atacante debe enviar un paquete HTTP a la interfaz de recuperaci\u00f3n de datos (/cgi/get_param.cgi) con la cookie tmpToken configurada con una cadena vac\u00eda seguida de un punto y coma. Esto evita la comprobaci\u00f3n de la autorizaci\u00f3n de la sesi\u00f3n activa. Esto puede ser usado para conseguir los valores de los campos protegidos sys.passwd y sys.su.name que contienen el nombre de usuario y la contrase\u00f1a en texto sin cifrar"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:powertekpdus:basic_pdu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.30.30",
"matchCriteriaId": "24FD9B82-5D75-491E-9D64-19B673378568"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:powertekpdus:basic_pdu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "960D65C6-F07C-4B85-8381-E90AE84F1A3B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:powertekpdus:pm_pdu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.30.30",
"matchCriteriaId": "F8331ED3-08F5-4262-8F10-6ABE8394764D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:powertekpdus:pm_pdu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA48F31E-2ACD-4E3C-870E-726A38C04EB1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:powertekpdus:piml_pdu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.30.30",
"matchCriteriaId": "E5AABA79-C8D8-4C7F-8140-8B95E176CE3D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:powertekpdus:piml_pdu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBF300E-47B2-47FF-91C9-B0EA4473C476"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:powertekpdus:smart_pim_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.30.30",
"matchCriteriaId": "72E649EC-CCAC-4D52-9917-AF5F98D9A385"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:powertekpdus:smart_pim:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6DEFFC-E208-42AA-9A86-9BEC62A95362"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:powertekpdus:smart_pos_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.30.30",
"matchCriteriaId": "89A6F4C3-CA16-4CE4-BBBC-B477A8CF58AC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:powertekpdus:smart_pos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "733D34C9-2249-4D5B-8CBC-C905B8FD0CF5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:powertekpdus:smart_pom_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.30.30",
"matchCriteriaId": "7B2899F7-848E-4115-A5CA-E8372538999D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:powertekpdus:smart_pom:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEFC68A-5C05-4D12-9A53-AAC7E74C164B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:powertekpdus:smart_poms_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.30.30",
"matchCriteriaId": "5A783F76-C41A-4295-B2F6-E9BD9D5AC6B5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:powertekpdus:smart_poms:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C57A1A7-ED1B-46E5-A708-435FF8105DA7"
}
]
}
]
}
],
"references": [
{
"url": "https://gynvael.coldwind.pl/?lang=en&id=748",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}