vendor:
SANYO network camera and network optional board
by:
LiquidWorm
7,8
CVSS
HIGH
CSRF
352
CWE
Product Name: SANYO network camera and network optional board
Affected Version From: 2.03-06 (110315-00)
Affected Version To: 2.03-08 (111222-00)
Patch Exists: YES
Related CWE: CVE-2021-3156
CPE: h:panasonic:sanyo_cctv_network_camera
Metasploit:
https://www.rapid7.com/db/vulnerabilities/apple-osx-sudo-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/redhat-openshift-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp3-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/alma_linux-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp5-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp8-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2021-3156/
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=148873, https://www.infosecmatter.com/nessus-plugin-library/?id=145570, https://www.infosecmatter.com/nessus-plugin-library/?id=145488, https://www.infosecmatter.com/nessus-plugin-library/?id=145463, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/local/sudo_baron_samedit, https://www.infosecmatter.com/nessus-plugin-library/?id=146251, https://www.infosecmatter.com/nessus-plugin-library/?id=145693, https://www.infosecmatter.com/nessus-plugin-library/?id=145536, https://www.infosecmatter.com/nessus-plugin-library/?id=145451, https://www.infosecmatter.com/nessus-plugin-library/?id=157707
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Embedded Linux, CGI
2021
Panasonic Sanyo CCTV Network Camera 2.03-0x – ‘Disable Authentication / Change Password’ CSRF
The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. These actions can be exploited to perform authentication detriment and account password change with administrative privileges if a logged-in user visits a malicious web site.
Mitigation:
Implement proper input validation and authentication checks to verify the requests.