Farmer's Fridge Kiosk 2.0.0 Unprotected Event Log Information Disclosure
Title: Farmer's Fridge Kiosk 2.0.0 Unprotected Event Log Information Disclosure
Advisory ID: ZSL-2017-5399
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information, DoS
Risk: (5/5)
Release Date: 26.03.2017
When visiting the root page of the interface the following kiosk information is disclosed:
Version: 2.0.0 Server: PhysicalServer Config: {id=NAME_OF_COMPANY hostname=HOSTNAME location=STREET_ADDRESS, STATE, ZIP serialNumber=serial ip=REMOTE_ADDRESS_OF_KIOSK serialPort=ttyS1 isProd=true useMock=false messageQueue=/usr/share/kiosk-node/conf/queues planogramName=NAME_OF_COMPANY groups=List(KioskGroup(ALL)),route=None} Diagnostics: tools version VIPETL00, temp expiry disabled
When visiting the events page information, the following log history is disclosed in plain-text:
- Date, time and location of the transaction made
- Authorization status on swipe
- Credit card number + CVV
- Name and surname on credit card
- Personal e-mail account
- What was bought and how much it costs
nginx/1.6.2
Ubuntu
[02.03.2017] Contact US-CERT.
[02.03.2017] US-CERT assigns tracking id VU#762415.
[08.03.2017] US-CERT suggests to contact vendor.
[08.03.2017] Vendor contacted.
[25.03.2017] No response from the vendor.
[26.03.2017] Public security advisory released.
[2] https://cxsecurity.com/issue/WLB-2017030244
[3] https://packetstormsecurity.com/files/141822
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/123834
[31.03.2017] - Added reference [1], [2], [3] and [4]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2017-5399
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information, DoS
Risk: (5/5)
Release Date: 26.03.2017
Summary
Don’t think of the Farmer’s Fridge kiosk as a vending machine. It’s a veggie machine. And just as each salad is a culinary thing of beauty, the kiosk is a work of art in its own right. Made from reclaimed wood (provided by Modern Urban Woods of West Chicago) and even some recycled materials, each one is unique and user-friendly.Description
The kiosk vending machine suffers from personally identifiable information (PII) disclosure vulnerability. By default, the firmware listens on port 9000/tcp as cslistener service using the Play Framework to present some basic information about the system when visiting the interface. The interface is accessed without any authentication system in place. When visited, some server information is disclosed by default and some XML pages for various config and supply information are disclosed, including the ability to reset or reboot the kiosk. One of those options is to show an 'event' type log history page containting various status of temperatures, supply count and transaction details. An attacker can increase the number for the 'days' GET parameter to disclose even more data back in history.When visiting the root page of the interface the following kiosk information is disclosed:
Version: 2.0.0 Server: PhysicalServer Config: {id=NAME_OF_COMPANY hostname=HOSTNAME location=STREET_ADDRESS, STATE, ZIP serialNumber=serial ip=REMOTE_ADDRESS_OF_KIOSK serialPort=ttyS1 isProd=true useMock=false messageQueue=/usr/share/kiosk-node/conf/queues planogramName=NAME_OF_COMPANY groups=List(KioskGroup(ALL)),route=None} Diagnostics: tools version VIPETL00, temp expiry disabled
When visiting the events page information, the following log history is disclosed in plain-text:
- Date, time and location of the transaction made
- Authorization status on swipe
- Credit card number + CVV
- Name and surname on credit card
- Personal e-mail account
- What was bought and how much it costs
Vendor
Farmer's Fridge - http://www.farmersfridge.comAffected Version
2.0.0Tested On
PhysicalServernginx/1.6.2
Ubuntu
Vendor Status
[01.03.2017] Vulnerability discovered.[02.03.2017] Contact US-CERT.
[02.03.2017] US-CERT assigns tracking id VU#762415.
[08.03.2017] US-CERT suggests to contact vendor.
[08.03.2017] Vendor contacted.
[25.03.2017] No response from the vendor.
[26.03.2017] Public security advisory released.
PoC
farmer_kiosk.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://cxsecurity.com/issue/WLB-2017030228[2] https://cxsecurity.com/issue/WLB-2017030244
[3] https://packetstormsecurity.com/files/141822
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/123834
Changelog
[26.03.2017] - Initial release[31.03.2017] - Added reference [1], [2], [3] and [4]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk