PrismaWEB - Credentials Disclosure
ID: CVE-2018-9161
Severity: critical
Author: gy741
Tags: cve2018,cve,prismaweb,exposure,edb,prismaindustriale
Description
Section titled “Description”PrismaWEB is susceptible to credential disclosure. The vulnerability exists due to the disclosure of hard-coded credentials allowing an attacker to effectively bypass authentication of PrismaWEB with administrator privileges. The credentials can be disclosed by simply navigating to the login_par.js JavaScript page that holds the username and password for the management interface that are being used via the Login() function in /scripts/functions_cookie.js script.
YAML Source
Section titled “YAML Source”id: CVE-2018-9161
info: name: PrismaWEB - Credentials Disclosure author: gy741 severity: critical description: PrismaWEB is susceptible to credential disclosure. The vulnerability exists due to the disclosure of hard-coded credentials allowing an attacker to effectively bypass authentication of PrismaWEB with administrator privileges. The credentials can be disclosed by simply navigating to the login_par.js JavaScript page that holds the username and password for the management interface that are being used via the Login() function in /scripts/functions_cookie.js script. impact: | An attacker could gain unauthorized access to the application and potentially compromise user accounts and sensitive data. remediation: | Ensure that sensitive credentials are properly protected and not exposed in the application's source code or configuration files. reference: - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5453.php - https://nvd.nist.gov/vuln/detail/CVE-2018-9161 - https://www.exploit-db.com/exploits/44276/ - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2018-9161 cwe-id: CWE-798 epss-score: 0.12574 epss-percentile: 0.95318 cpe: cpe:2.3:a:prismaindustriale:checkweigher_prismaweb:1.21:*:*:*:*:*:*:* metadata: max-request: 1 vendor: prismaindustriale product: checkweigher_prismaweb tags: cve2018,cve,prismaweb,exposure,edb,prismaindustriale
http: - method: GET path: - "{{BaseURL}}/user/scripts/login_par.js"
matchers-condition: and matchers: - type: word part: body words: - 'txtChkUser' - 'txtChkPassword' condition: and
- type: status status: - 200# digest: 4a0a00473045022100c2bb93da2cc08af476a2c7dc05a28761b96ac38f41147018bd8e3d6e761bf14f0220667f8f718940b77c65ca3423bdac1c1f44770fddc58a332794e9af34d5e4ba86:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-9161.yaml"