UBICOD Medivision Digital Signage 1.5.1 CSRF Add Super Admin

Title: UBICOD Medivision Digital Signage 1.5.1 CSRF Add Super Admin
Advisory ID: ZSL-2020-5574
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 19.07.2020
Summary
Medivision is a service that provides everything from DID operation to development of DID (Digital Information Display) optimized for hospital environment and production of professional contents, through DID product installation, image, video content planning, design work, and remote control. This is a one-stop solution that solves management at once.
Description
The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
Vendor
UBICOD Co., Ltd. | MEDIVISION INC. - http://www.medivision.co.kr
Affected Version
Firmware 1.5.1 (2013.01.3)
Tested On
Apache/2.4.7 (Ubuntu)
PHP/5.5.9-1ubuntu4.22
Vendor Status
[19.06.2020] Vulnerability discovered.
[21.06.2020] Vendor contacted.
[18.07.2020] No response from the vendor.
[19.07.2020] Public security advisory released.
PoC
ubicod_csrf.html
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] https://packetstormsecurity.com/files/158477
[2] https://exchange.xforce.ibmcloud.com/vulnerabilities/185534
[3] https://cxsecurity.com/issue/WLB-2020070114
[4] https://www.exploit-db.com/exploits/48694
Changelog
[19.07.2020] - Initial release
[24.07.2020] - Added reference [1], [2] and [3]
[02.08.2020] - Added reference [4]
Contact
Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk