ABB IDAL HTTP Server Authentication Bypass

Risk: Medium
Local: No
Remote: Yes
CWE: CWE-287

CVSS Base Score: 5.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 6.5/10
Exploit range: Adjacent network
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

XL-19-010 - ABB IDAL HTTP Server Authentication Bypass Vulnerability ======================================================================== Identifiers ----------- XL-19-010 CVE-2019-7226 ABBVU-IAMF-1902005 CVSS Score ---------- 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) Affected vendor --------------- ABB ( Credit ------ Eldar Marcussen - xen1thLabs - Software Labs Vulnerability summary --------------------- The IDAL HTTP server CGI interface contains a URL, which allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. Technical details ----------------- In the IDAL CGI interface, there is a URL (/cgi/loginDefaultUser), which will create a session in an authenticated state and return the session ID along with the username and plaintext password of the user. An attacker can then login with the provided credentials or supply the string 'IDALToken=......' in a cookie which will allow them to perform privileged operations such as restarting the service with /cgi/restart. Proof of concept ---------------- ``` GET http://localhost:81/cgi/loginDefaultUser ```` 1 #S_OK IDALToken=532c8632b86694f0232a68a0897a145c admin adminpass Affected systems ---------------- PB610 Panel Builder 600, order code: 1SAP500900R0101, versions 1.91 ... Solution -------- Apply the patches and instructions from vendor: - ABB PB610 - Disclosure timeline ------------------- 04/02/2019 - Contacted ABB requesting disclosure coordination 05/02/2019 - Provided vulnerability details 05/06/2019 - Patch available 17/06/2019 - xen1thLabs public disclosure

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019,


Back to Top