HackDig : Dig high-quality web security articles for hackers

SpinetiX Fusion Digital Signage 3.4.8 CSRF Add Admin Exploit

2020-09-30 16:40
Title: SpinetiX Fusion Digital Signage 3.4.8 CSRF Add Admin Exploit
Advisory ID: ZSL-2020-5592
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 30.09.2020
Summary
At SpinetiX we inspire businesses to unlock the potential of their story.We believe in the power of digital signage as a dynamic new storytelling platformto engage with people. For more than 13 years, we have been constantly innovatingto deliver cutting-edge digital signage solutions that help our customers shine.Fusion is a built-in content management application accessible from a standard webbrowser - it is pre-installed on every HMP200, HMP130, and HMP100 device, and doesnot require any additional license, cost, or software installation.
Description
The application interface allows users to perform certain actions via HTTPrequests without performing any validity checks to verify the requests. This canbe exploited to perform certain actions with administrative privileges if a logged-inuser visits a malicious web site.
Vendor
SpinetiX AG - https://www.spinetix.com
Affected Version
<=3.4.8 (1.0.36274)
Tested On
Apache 2.2.34
PHP/5.3.18-2
Linux 2.6.10
Vendor Status
[03.08.2020] Vulnerability discovered.
[25.09.2020] Vendor contacted.
[30.09.2020] No response from the vendor.
[30.09.2020] Public security advisory released.
PoC
spinetix_csrf.txt
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
N/A
Changelog
[30.09.2020] - Initial release
Contact
Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk


Source: php.2955-0202-LSZ/seitilibarenluv/ne/km.ecneicsorez.www

Read:353 | Comments:0 | Tags: Csrf exploit

“SpinetiX Fusion Digital Signage 3.4.8 CSRF Add Admin Exploit”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Tools