Intel Modular Server System 10.18 CSRF Change Admin Password Exploit

Title: Intel Modular Server System 10.18 CSRF Change Admin Password Exploit
Advisory ID: ZSL-2019-5514
Type: Remote/Local
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 13.03.2019
Summary
The Intel Modular Server System is a blade system manufactured by Intel using their own motherboards and processors. The Intel Modular Server System consists of an Intel Modular Server Chassis, up to six diskless Compute Blades, an integrated storage area network (SAN), and three to five Service Modules.
Description
The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
Vendor
Intel Corporation - https://www.intel.com
Affected Version
10.18.100.20130627.38849
5.5.100.20091202.19584
Tested On
lighttpd/1.4.30
lighttpd/1.4.21
PHP/5.3.10
PHP/5.2.2
Vendor Status
[11.03.2019] Vulnerability discovered.
[12.03.2019] Vendor contacted.
[12.03.2019] Vendor acknowledges receipt of details.
[13.03.2019] Vendor informs no CVE and no patches for EoL products.
[13.03.2019] Public security advisory released.
PoC
intel_modularserver.html
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] https://exchange.xforce.ibmcloud.com/vulnerabilities/158204
[2] https://cxsecurity.com/issue/WLB-2019030115
[3] https://packetstormsecurity.com/files/152081
[4] https://www.exploit-db.com/exploits/46541
Changelog
[13.03.2019] - Initial release
[17.03.2019] - Added reference [1], [2], [3] and [4]
Contact
Zero Science Lab

Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk