exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

BINOM3 Power Meter CSRF / XSS / Credential Management

BINOM3 Power Meter CSRF / XSS / Credential Management
Posted Sep 16, 2016
Authored by Karn Ganeshen

BINOM3 power meter suffers from cross site request forgery, weak credential management, information leakage, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | da90f0253119dee9efcf642299ab65df9fc9b9a14cd008de6f27108d78d99c7c

BINOM3 Power Meter CSRF / XSS / Credential Management

Change Mirror Download
*Universal multifunctional Electric Power Quality Meter BINOM3 - Multiple
Vulnerabilities*

*About*
The meters are designed for autonomous operation in automated systems:
aC/ SCADA systems
aC/ Data aquisition and transmission systems
aC/ Automated data and measurement systems for revenue and technical power
metering
aC/ Power quality monitoring and control systems
aC/ Automated process control systems, Management information system

+++++
*Submitted to ICS-CERT *- May 25, 2016.
*No response from vendor till date.*
+++++

*Vulnerability Information*

*HTTP*

1. *Reflected **XSS* a multiple urls, parameters
Successful exploitation of this vulnerability could allow an
unauthenticated as well as authenticated, attacker to inject arbitrary
JavaScript in a specially crafted URL request where the response containing
user data is returned to the web browser without being made safe to display.

2. *Stored **XSS* a multiple urls, parameters
Successful exploitation of this vulnerability could allow an authenticated
attacker to inject arbitrary JavaScript in specific input fields, which get
stored in the underlying db, and once accessed, the data including
malicious scripts, is returned to the web browser leading to script
execution.

3. *Weak Credentials Management *
The device comes configured with four (4) login accounts:
- admin / 1
- user / 1
- alg / 1
- telem / 1

3a) These passwords do not meet even basic security criterion.
3b) To further make it easier for attacker(s), the application design does
not provide the users, any option to change their own passwords in device
management portal. Only 'root' can change passwords for all other accounts.
(AFAIK)

4.* Undocumented root account *
In addition to the above four documented login accounts, there is a 'root'
superuser account:
- root / root
- root account details are not documented in the device administration
guide or manuals
- root account has multiple, additional functions accessible like user
management

5. *Sensitive Information stored in clear-text *
- all user passwords are stored / viewable in clear-text

Additionally, specific non-root, non-privileged users can access complete
device configuration file, which contains clear-text passwords and other
config information. This flaw can be used to gain privileged access to the
device.

6*. Vulnerable to Cross-Site Request Forgery *

There is no CSRF Token generated per page and / or per (sensitive)
function. Successful exploitation of this vulnerability can allow silent
execution of unauthorized actions on the device such as configuration
parameter changes, and saving modified configuration.

7. *Sensitive information leakage*

Every time aroota logs in, a GET request is made to a specific url to
access password configuration file.

Response comes as xml data, and contains all accounts and their passwords.
As, by default, the management portal is configured for HTTP, a suitably
positioned attacked can sniff all login credentials, and gain privileged
access.

*Telnet *

1. *Access Control Issues*
By default, password authentication is not enabled on Telnet access (AFAIK).
- This access gives superuser-level access to device
- Access to the device provides detailed info on application,
configuration, device file system, databases (including Energy & billing),
consumption, Statistics, network information, as well as clear-text creds
(FTP)
- Easy vector to device & data compromise

+++++


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close