Описание
An authentication bypass vulnerability exists in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application allowing an unauthenticated attacker to perform authenticated actions on the device via a 127.0.0.1:port value in the HTTP 'Host' header, as demonstrated by retrieving credentials.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 4.0.539 (включая) до 4.0.975 (включая)
Одновременно
cpe:2.3:o:rainmachine:mini-8_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:rainmachine:mini-8:-:*:*:*:*:*:*:*
Конфигурация 2Версия от 4.0.539 (включая) до 4.0.974 (включая)
Одновременно
cpe:2.3:o:rainmachine:touch_hd_12_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:rainmachine:touch_hd_12:-:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.04283
Низкий
9.8 Critical
CVSS3
5 Medium
CVSS2
Дефекты
CWE-287
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
An authentication bypass vulnerability exists in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application allowing an unauthenticated attacker to perform authenticated actions on the device via a 127.0.0.1:port value in the HTTP 'Host' header, as demonstrated by retrieving credentials.
EPSS
Процентиль: 89%
0.04283
Низкий
9.8 Critical
CVSS3
5 Medium
CVSS2
Дефекты
CWE-287