Sint Wind PI v01.26.19 Authentication Bypass
Title: Sint Wind PI v01.26.19 Authentication Bypass
Advisory ID: ZSL-2018-5472
Type: Local/Remote
Impact: Security Bypass, System Access
Risk: (5/5)
Release Date: 05.06.2018
Raspberry PI
[29.05.2018] Vendor contacted with details sent.
[29.05.2018] Vendor replies: "You can just push request on the official report".
[05.06.2018] Public security advisory released.
[2] https://packetstormsecurity.com/files/148049
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/144472
[13.06.2018] - Added reference [1], [2] and [3]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2018-5472
Type: Local/Remote
Impact: Security Bypass, System Access
Risk: (5/5)
Release Date: 05.06.2018
Summary
A Meteo Station software for Raspberry PI. Capability include telephone answering, webcams, digital cameras, web. A Sint Wind is a wind condition (and other meteo data) telephone answering machine. This implementation uses a Raspberry PI with an Huawei 3G dongle. The Sint Wind is compatible with different kind of Meteo Sensors (WH1080, WH3080, Davis, TX32, BMP085...).Description
Insecure Direct Object Reference flaw allows retrieval of configuration file which contains authentication credentials to device and other nodes associated with it. The web application does not check for an authenticated session to access its resources allowing direct access to swpi.cfg (config file) which contains credentials.Vendor
Tonino Tarsi - https://github.com/ToninoTarsi/swpiAffected Version
01.26.19Tested On
SimpleHTTP/0.6 Python/2.7.3Raspberry PI
Vendor Status
[28.05.2018] Vulnerability discovered.[29.05.2018] Vendor contacted with details sent.
[29.05.2018] Vendor replies: "You can just push request on the official report".
[05.06.2018] Public security advisory released.
PoC
sintwind_auth.txtCredits
Vulnerability discovered by Humberto Cabrera - <humbe@zeroscience.mk>References
[1] https://cxsecurity.com/issue/WLB-2018060047[2] https://packetstormsecurity.com/files/148049
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/144472
Changelog
[05.06.2018] - Initial release[13.06.2018] - Added reference [1], [2] and [3]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk