exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Calamp.com Incorrect Privilege Assignment

Calamp.com Incorrect Privilege Assignment
Posted May 14, 2018
Authored by Vangelis Stykas, George Lavdanis

Calamp.com suffers from an incorrect privilege assignment that could lead to full user compromise.

tags | exploit
SHA-256 | 824272e7f985ec98cd3a26cb716b48ca74d30709f79f661b344df8e28f2034da

Calamp.com Incorrect Privilege Assignment

Change Mirror Download
There is also a full write up on https://medium.com/@evstykas/remote-smart-car-hacking-with-just-a-phone-2fe7ca682162 <https://medium.com/@evstykas/remote-smart-car-hacking-with-just-a-phone-2fe7ca682162>

Vulnerability Security Advisory < 20180501 >
=======================================================================
title: Incorrect Privilege Assignment
product: lenderoutlook on colt.calamp-ts.com
vulnerable version: latest
fixed version: -
CVE number: -
impact: critical
found: 2018-04-31
by: Vangelis Stykas & George Lavdanis

=======================================================================

Vendor description:
-------------------
Calamp is a telematics pioneer on M2M that manages more than 1.5M IoT devices.


Vulnerability overview/description:
-----------------------------------
1) Incorrect Privilege Assignment

When a user is logged in https://colt.calamp-ts.com/dashboard/login , a service that is being used by many vendors (such as viper smartstart and directed smartstart) it makes a request to
https://reporting.calamp.com/jasperserver-pro/ to login with the same user.This server is used to generate reports regarding users vehicles using TIBCO jaspersoft server.
When the reports are run from the dashboard they are limited to user owned vehicles but this is not the case when accessing the jaspersoft server directly.
Any report on any user vehicle can run, making location / past whereabouts of vehicles and users available.A lot of financial data reports are also available.
Data sources are also viewable / editable / exportable .After exporting clear text passwords of data sources are available.
As data sources are editable a ddos can be caused just by editing them.
As data sources are correctly firewalled no direct access is possible.
We can manipulate by editing existing reports , adhoc views and queries to access all the data on the underlying data sources and using it to lead to a full compromise of the platform.
Exploiting this also gives access to connect.calamp.com database.


Proof of concept:
-----------------
1) Incorrect Privilege Assignment:

### Details
* Attack Vector: HTTP GET
* Prerequisites: None
* CWE: CWE-266: Incorrect Privilege Assignment
* Technical Impact: View reports of any user / vehicle / iot device, query about any user / vehicle / iot device, access underlying data sources.
* Vulnerable query URL: /



Vulnerable / tested versions:
-----------------------------
https://colt.calamp-ts.com/
https://connect.calamp.com/

Vendor contact timeline:
------------------------
2018a05a01: Sent support request requesting proper disclosure steps
2018a05a01: Asked via twitter dm on @calamp for an email to sent report
2018a05a02: Reached out via linkedin to a cybersecurity employee at calamp for direction on proper disclosure
2018a05a02: Reached out to CERT which guided us to the proper communication channel
2018a05a02: Calamp answered and acknowledged issue
2018a05a03: Calamp updated us that their are working on a fix
2018a05a12: Calamp notified us that is is patched and after verification we are releasing this.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close