UBICOD Medivision Digital Signage 1.5.1 CSRF Add Super Admin
Title: UBICOD Medivision Digital Signage 1.5.1 CSRF Add Super Admin
Advisory ID: ZSL-2020-5574
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 19.07.2020
PHP/5.5.9-1ubuntu4.22
[21.06.2020] Vendor contacted.
[18.07.2020] No response from the vendor.
[19.07.2020] Public security advisory released.
[2] https://exchange.xforce.ibmcloud.com/vulnerabilities/185534
[3] https://cxsecurity.com/issue/WLB-2020070114
[4] https://www.exploit-db.com/exploits/48694
[24.07.2020] - Added reference [1], [2] and [3]
[02.08.2020] - Added reference [4]
Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2020-5574
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 19.07.2020
Summary
Medivision is a service that provides everything from DID operation to development of DID (Digital Information Display) optimized for hospital environment and production of professional contents, through DID product installation, image, video content planning, design work, and remote control. This is a one-stop solution that solves management at once.Description
The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.Vendor
UBICOD Co., Ltd. | MEDIVISION INC. - http://www.medivision.co.krAffected Version
Firmware 1.5.1 (2013.01.3)Tested On
Apache/2.4.7 (Ubuntu)PHP/5.5.9-1ubuntu4.22
Vendor Status
[19.06.2020] Vulnerability discovered.[21.06.2020] Vendor contacted.
[18.07.2020] No response from the vendor.
[19.07.2020] Public security advisory released.
PoC
ubicod_csrf.htmlCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://packetstormsecurity.com/files/158477[2] https://exchange.xforce.ibmcloud.com/vulnerabilities/185534
[3] https://cxsecurity.com/issue/WLB-2020070114
[4] https://www.exploit-db.com/exploits/48694
Changelog
[19.07.2020] - Initial release[24.07.2020] - Added reference [1], [2] and [3]
[02.08.2020] - Added reference [4]
Contact
Zero Science LabWeb: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk