Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-24709 PoC — Paradox Security Systems IPR512 代码注入漏洞

Source
Associated Vulnerability
Title:Paradox Security Systems IPR512 代码注入漏洞 (CVE-2023-24709)
Description:Paradox Security Systems IPR512是美国Paradox公司的一个提供通过网络来监控管理Paradox设备的通信模块。 Paradox Security Systems IPR512版本存在安全漏洞,该漏洞源于允许攻击者通过login.html和login.xml参数造成拒绝服务。
Description
In Paradox Security System IPR512 Web console login form page, attacker can input JavaScript string, such as "</script>" that will overwrite configurations in the file "login.xml" and cause the login page to crash. 
Readme
# Injection vulnerability in Paradox Security Systems IPR512 - CVE-2023-24709 PoC
In Paradox Security System IPR512 Web console login form page, attacker can input JavaScript string, such as <code></script></code> that will overwrite configurations in the file "login.xml" and cause the login form to crash and make it unavailable. 

!!!WARNING!!! Be aware that it will make a damaging impact on the service functioning!

<b>1. The Paradox Security Systems IPR512 Account Management webpanel is accessible. Typing "admin" as a user.</b>
  
![screenshot](/img/pss_1.png)
  
<b>2. Intercepting request with BurpSuite.</b>
  
![screenshot](/img/pss_2.png)

<b>3. Changing "admin" with JavaScript tag <code></script></code></b>
  
![screenshot](/img/pss_3.png)

<b>4. URL encoding <code></script></code> to bypass security filter and sending request.</b>

![screenshot](/img/pss_4.png)

<b>5. If accessing the login.xml isn't restricted, you can check that it is overwritten.</b>
  
![screenshot](/img/pss_5.png)

<b>6. The webpanel login form isn't accessible anymore as it is crashed.</b>
  
![screenshot](/img/pss_6.png)

Code injection vulnerability in login.html in Web panel login page on IPR512 of the Paradox Security Systems product that allows a remote or local attacker to cause the web panel login page crash via injecting easy JavaScript code into login form page such as <code></script></code>. 
File Snapshot

[4.0K] /data/pocs/2d142a8b3a708ca50aa26cb1369fba04dd4eee26 ├── [2.0K] cve-2023-24709.sh ├── [4.0K] img │   ├── [ 41K] pss_1.png │   ├── [ 48K] pss_2.png │   ├── [ 49K] pss_3.png │   ├── [ 59K] pss_4.png │   ├── [ 29K] pss_5.png │   └── [ 25K] pss_6.png └── [1.4K] README.md 1 directory, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.