DRAGOWN / Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC

In Paradox Security System IPR512 Web console login form page, attacker can input JavaScript string, such as "</script>" that will overwrite configurations in the file "login.xml" and cause the login page to crash.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Injection vulnerability in Paradox Security Systems IPR512 - CVE-2023-24709 PoC

In Paradox Security System IPR512 Web console login form page, attacker can input JavaScript string, such as </script> that will overwrite configurations in the file "login.xml" and cause the login form to crash and make it unavailable.

!!!WARNING!!! Be aware that it will make a damaging impact on the service functioning!

1. The Paradox Security Systems IPR512 Account Management webpanel is accessible. Typing "admin" as a user.

screenshot

2. Intercepting request with BurpSuite.

screenshot

3. Changing "admin" with JavaScript tag </script>

screenshot

4. URL encoding </script> to bypass security filter and sending request.

screenshot

5. If accessing the login.xml isn't restricted, you can check that it is overwritten.

screenshot

6. The webpanel login form isn't accessible anymore as it is crashed.

screenshot

Code injection vulnerability in login.html in Web panel login page on IPR512 of the Paradox Security Systems product that allows a remote or local attacker to cause the web panel login page crash via injecting easy JavaScript code into login form page such as </script>.

About

In Paradox Security System IPR512 Web console login form page, attacker can input JavaScript string, such as "</script>" that will overwrite configurations in the file "login.xml" and cause the login page to crash.


Languages

Language:Shell 100.0%