An issue was discovered in CIRCONTROL CirCarLife before 4.3. Due to the storage of multiple sensitive information elements in a JSON format at /services/system/setup.json, an authenticated but unprivileged user can exfiltrate critical setup information.
References
Link | Resource |
---|---|
https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/45384/ | Exploit Third Party Advisory VDB Entry |
https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/45384/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/SadFud/Exploits/tree/master/Real%20World/Suites/cir-pwn-life - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/45384/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-09-26 17:29
Updated : 2024-11-21 03:53
NVD link : CVE-2018-16672
Mitre link : CVE-2018-16672
CVE.ORG link : CVE-2018-16672
JSON object : View
Products Affected
circontrol
- circarlife_scada
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor