header-logo
Suggest Exploit
vendor:
Solar Data Recorder
by:
Luca.Chiou
7.5
CVSS
HIGH
Stored XSS
79
CWE
Product Name: Solar Data Recorder
Affected Version From: all versions prior to v1.3.0
Affected Version To: v1.3.0
Patch Exists: YES
Related CWE: N/A
CPE: a:auo:solar_data_recorder
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Proprietary devices
2019

AUO Solar Data Recorder – Stored XSS

In AUO Solar Data Recorder web page, user can modify the system settings by access the /protect/config.htm. Attackers can inject malicious XSS code in parameter 'addr' of post data. The value of addr will be stored in database, so that cause a stored XSS vulnerability.

Mitigation:

Input validation and output encoding should be used to prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title: AUO Solar Data Recorder - Stored XSS
# Date: 2019-04-16
# Exploit Author: Luca.Chiou
# Vendor Homepage: https://www.auo.com/zh-TW
# Version: AUO Solar Data Recorder all versions prior to v1.3.0
# Tested on: It is a proprietary devices: https://solar.auo.com/en-global/Support_Download_Center/index

# 1. Description:
# In AUO Solar Data Recorder web page,
# user can modify the system settings by access the /protect/config.htm.
# Attackers can inject malicious XSS code in parameter "addr" of post data.
# The value of addr will be stored in database, so that cause a stored XSS vulnerability.

# 2. Proof of Concept:
# Browse http://<Your<http://%3cYour> Modem IP>/protect/config.htm
# Send this post data:
 addr= "<script>alert(123)</script>&dhcp=1