CSAL-ID

Date

Vendor

Advisory

CVE Number

Vulnerability overview

Description

51

12-Jan-24

WP500-VN00001

WP500 Authorization

NA

Authorisation or authentication

OTP bypass is possible. It was found that OTP validation is happening on the client side, and not the server side. By trapping an OTP success response, and injecting it into an OTP failure response, the bypass is possible whereby a bogus or wrong OTP can be used.







http://192.168.1.150/imageServlet

52

12-Jan-24

WP500-VN00002

WP500 unprivileged access

NA

Unprivileged Access of Privilege URLs

Unprivileged Access of Privilege URLs (i.e. URLs/links accessible only after login) is possible. If  hacker simply knows the URL she/he can enter the URL manually in the browser and hit enter, after which the contetn or data of that URL is accessible to any user without any validation or authorization.







http://192.168.1.150/DownloadLogServlet?log_file=WP500_2020-09-20_10-16-12.log

53

12-Jan-24

WP500-VN00003

WP500 CSRF Attack 

NA

CSRF Attack Possible on Various Forms

Cross site request forgery (CSRF) attack possible on the forms mentioned below. This can let attacker sit remotely, create a dummy form and submit it using victim's valid session who is already logged in, either via a chat application or a phishing attack. From technical point of view, this is possible due to the lack of CSRF token in HTTP POST form which makes it vulnerable to a remote request forgery. Replicating this problem is not easy however please read solution mentioned below to fix the issue.







1) CSRF -  Parameter - Delete , Edit, Add







URL -







http://192.168.1.150/OPCUAClientServlet







2) Parameter - Delete ,  Add







http://192.168.1.150/tagMapping







3) Parameter - Add, Edit , Delete







http://192.168.1.150/jsonBuilderServlet







4) Parameter - Edit, Add, Delete







http://192.168.1.150/userServlet

54

12-Jan-24

WP500-VN00004

WP 500 CSV

NA

CSV Injection Attack Found

CSV injection attack was found on the mentioned URL:







Steps to replicate the attack:







1. Login using wp500







2. Go to Tag mapping under Service tab







3. Add record and give tag name as =calc|a!z command







4. Save this record. Then click on Export Data







5. Open the downloaded Xlsx and you will see that the command will get executed then calculator will get open.







URL - http://192.168.1.150/TagMapping.jsp







Parameter - Tag Name, PV address

CSAL#55

12-Jan-24

WP500-VN00005

WP500 Vulnerable apache 

NA

Vulnerable Apache Tomcat Version Found

Vulnerable version of Apache Tomcat was found in usage with multiple vulnerabilities i.e. Apache Tomcat: Important: Remote Code Execution (CVE-2016-8735) (apache-tomcat-cve-2016-8735), (CVE-2017-5651) (apache-tomcat-cve-2017-5651), (CVE-2018-8014) (apache-tomcat-cve-2018-8014), (CVE-2022-25762) (apache-tomcat-cve-2022-25762)














Vulnerable software installed: Apache Tomcat 8.5.5

CSAL#56

12-Jan-24

WP500-VN00006

WP500 Privilege Escalation 

NA

Privilege Escalation via Form Submission

Privilege escalation is possible by entire form of a HTTP POST or HTTP GET Request. Steps to replicate the attack:







1. Login as admin user.







2. Capture the below POST requests using a proxy tool and save these requests in the repeater.







3. Logout of admin and login as operator user.







4. Now, repeat the above-saved requests using the session of the operator user.







5. The operator will be able to perform the mentioned actions which are disabled in the application.







6. To verify the same, login back as admin and check the changes made by the operator are updated.














URLs:







https://192.168.1.150/userServlet







user_action= update, delete, update_user_password, add







https://192.168.1.150/BasicConfigurationServlet














Note: Similarly for all such POST requests

CSAL#57

12-Jan-24

WP500-VN00007

WP500 x frame option

NA

Click jacking Due to Missing X-Frame-Options Header

Found Click jacking: X-Frame-Options header missing. This can result in letting the browser allow to render a webpage in a <frame> or <script>, thus making it a spam-supporter for malicious websites.

CSAL#58

12-Jan-24

WP500-VN00008

WP 500 HTTPs 

NA

Insecure Transition from HTTPS to HTTP

Found Insecure transition from HTTPS to HTTP in form post, possible information disclosure or Man-in-the-middle attack chances.

CSAL#59

12-Jan-24

WP500-VN00009

WP 500  TLS support

NA

TLS Server Supports Outdated TLS 1.0

TLS Server Supports TLS version 1.0 (tlsv1_0-enabled)

CSAL#60

12-Jan-24

WP500-VN00010

WP 500 session limit

NA

No Limit on Concurrent Sessions

There was no limit found to be implemented for the number of concurrent sessions per interface for any given user (human, software process or device).

CSAL#61

12-Jan-24

WP500-VN00011

WP 500 web server

NA

Error Page Discloses Web Server Details

Error page discloses web server details.

CSAL#62

12-Jan-24

WP500-VN00012

WP 500 form fields

NA

Autocomplete Enabled on Form Fields

Form fields with Autocomplete enabled found. ?This can make the form data prone to client side human based or trojan based attacks, leading to data confidentiality loss.







 

CSAL#63

12-Jan-24

WP500-VN00013

WP500 web securities

NA

Missing HTTP Security Headers

Following HTTP security headers are missing:







Content Security Policy (CSP), X-frame-options, Strict-Transport-Security, X-Content-Type-Options

CSAL#64

12-Jan-24

WP500-VN00014

WP 500 apache tomcat files

NA

Default Apache Tomcat Files Present

Apache Tomcat Default Files. The remote web server contains default files.







The following default files were found :







http://taswp500/docs/







http://taswp500/examples/servlets/index.html







http://taswp500/examples/jsp/index.html







http://taswp500/examples/websocket/index.xhtml

CSAL#65

12-Jan-24

WP500-VN00015

WP500 open port

NA

Open Ports Found Internally

Following ports were found open internally:







192.168.1.150 open ports = 80 , 443, 502, 1200, 5355, 6801, 8009,







9000, 12686

CSAL#66

12-Jan-24

WP500-VN00016

WP500 vulnerabilities

NA

No Vulnerabilities Found with Auxiliary Scans on Open Ports

Payloads,exploits and auxiliaries performed on open ports found on these IP's :







IP - 192.168.1.150 on all corresponding open ports







auxiliary/scanner/http/ssl , auxiliary/scanner/ssl/openssl_heartbleed, auxiliary/scanner/http/http_version, auxiliary/scanner/http/options, auxiliary/scanner/http/robots_txt ,auxiliary/admin/http/tomcat_utf8_traversal and more .. . . .

Created with the Personal Edition of HelpNDoc: Powerful and User-Friendly Help Authoring Tool for Markdown Documents