Описание
Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 of the access request system have two related features that when combined by themselves and with an information disclosure vulnerability enable convincing social engineering attacks against administrators. When a device creates an access request, it specifies three fields: clientId, description, and permissions. The SignalK admin UI displays the description field prominently to the administrator when showing pending requests, but the actual permissions field (which determines the access level granted) is less visible or displayed separately. This allows an attacker to request admin permissions while providing a description that suggests readonly access. The access request handler trusts the X-Forwarded-For HTTP header without validation to determine the client's IP address. This header is intended to preserve the original client IP when requests pass through reverse prox
Ссылки
- Release Notes
- ExploitVendor Advisory
Уязвимые конфигурации
Одно из
EPSS
6.3 Medium
CVSS3
8.8 High
CVSS3
Дефекты
Связанные уязвимости
Signal K Server Vulnerable to Access Request Spoofing
EPSS
6.3 Medium
CVSS3
8.8 High
CVSS3