vendor:
WebVisit
by:
Deneut Tijl
7.3
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: WebVisit
Affected Version From: WebVisit (all versions)
Affected Version To: WebVisit (all versions)
Patch Exists: YES
Related CWE: CVE-2016-8380, CVE-2016-8371
CPE: a:phoenix_contact:webvisit
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: None
2018
Phoenix Contact WebVisit 2985725 – Authentication Bypass
Script to read and write PLC tags via a Webvisit HMI page (even in case of a password protection). Steps: Get Project Name: http://<ip>/, Get list of tags: http://<ip>/<projectname>.tcr, Get current values of tags: http://<ip>/cgi-bin/ILRReadValues.exe, Set new tag values: http://<ip>/cgi-bin/writeVal.exe?<tag>+<value> (urlencode!)
Mitigation:
Ensure that authentication is properly implemented and enforced.