ABB Cylon Aspect 3.08.01 File Upload MD5 Checksum Bypass
2024-11-1 23:8:56 Author: packetstormsecurity.com(查看原文) 阅读量:0 收藏


ABB Cylon Aspect 3.08.01 (badassMode) File Upload MD5 Checksum Bypass

Vendor: ABB Ltd.
Product web page: https://www.global.abb
Affected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio
Firmware: <=3.08.01

Summary: ASPECT is an award-winning scalable building energy management
and control solution designed to allow users seamless access to their
building data through standard building protocols including smart devices.

Desc: The ABB BMS/BAS system has a vulnerability in caldavInstall.php,
caldavInstallAgendav.php, and caldavUpload.php files, where the presence
of an EXPERTMODE parameter activates a badassMode feature. This mode allows
an unauthenticated attacker to bypass MD5 checksum validation during file
uploads. By enabling badassMode and setting the skipChecksum parameter, the
system skips integrity verification, allowing attackers to upload or install
altered CalDAV zip files without authentication. This vulnerability permits
unauthorized file modifications, potentially exposing the system to tampering
or malicious uploads.

Tested on: GNU/Linux 3.15.10 (armv7l)
GNU/Linux 3.10.0 (x86_64)
GNU/Linux 2.6.32 (x86_64)
Intel(R) Atom(TM) Processor E3930 @ 1.30GHz
Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz
PHP/7.3.11
PHP/5.6.30
PHP/5.4.16
PHP/4.4.8
PHP/5.3.3
AspectFT Automation Application Server
lighttpd/1.4.32
lighttpd/1.4.18
Apache/2.2.15 (CentOS)
OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64)
OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode)

Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience

Advisory ID: ZSL-2024-5860
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5860.php

21.04.2024

--

$ cat project

P R O J E C T

.|
| |
|'| ._____
___ | | |. |' .---"|
_ .-' '-. | | .--'| || | _| |
.-'| _.| | || '-__ | | | || |
|' | |. | || | | | | || |
____| '-' ' "" '-' '-.' '` |____
░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░
░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░
░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░
░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░

$ head caldavInstall.php caldavInstallAgendav.php
==> caldavInstall.php <==
<?php

$badassMode = false;
if (isset($_GET["EXPERTMODE"])) {
$badassMode = true;
}
?>

<html>
<head>

==> caldavInstallAgendav.php <==
<?php

$badassMode = false;
if (isset($_GET["EXPERTMODE"])) {
$badassMode = true;
}
?>

<html>
<head>

1. GET /caldavInstall.php?EXPERTMODE (FE)
2. GET /caldavInstallAgendav.php?EXPERTMODE (FE)
3. POST /caldavUpload.php -d "skipChecksum=1" (BE)


文章来源: https://packetstormsecurity.com/files/182456/ZSL-2024-5860.txt
如有侵权请联系:admin#unsafe.sh