The login interface on TNLSoftSolutions Sentry Vision 3.x devices provides password disclosure by reading an "if(pwd ==" line in the HTML source code. This means, in effect, that authentication occurs only on the client side.
References
Link | Resource |
---|---|
https://gist.github.com/pabloonicarres/c2c284ca7b025d629da39087445ed15d#file-sentryvision_authentication_bypass-sh | Exploit Third Party Advisory |
https://www.youtube.com/watch?v=pLMH9vGPRCo | Third Party Advisory |
https://gist.github.com/pabloonicarres/c2c284ca7b025d629da39087445ed15d#file-sentryvision_authentication_bypass-sh | Exploit Third Party Advisory |
https://www.youtube.com/watch?v=pLMH9vGPRCo | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/pabloonicarres/c2c284ca7b025d629da39087445ed15d#file-sentryvision_authentication_bypass-sh - Exploit, Third Party Advisory | |
References | () https://www.youtube.com/watch?v=pLMH9vGPRCo - Third Party Advisory |
Information
Published : 2018-03-29 16:29
Updated : 2024-11-21 04:14
NVD link : CVE-2018-9031
Mitre link : CVE-2018-9031
CVE.ORG link : CVE-2018-9031
JSON object : View
Products Affected
tnlsoftsolutions
- sentry_vision
CWE
CWE-522
Insufficiently Protected Credentials