Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-1302 PoC — Badger Meter Monitool 信息泄露漏洞

Source
Associated Vulnerability
Title:Badger Meter Monitool 信息泄露漏洞 (CVE-2024-1302)
Description:Badger Meter Monitool是Badger Meter公司的一款用于监控和管理水务系统的工具。 Badger Meter Monitool 4.6.3版本及之前版本存在信息泄露漏洞,该漏洞源于可以将应用程序的file参数更改为日志文件,从而获取所有敏感信息。
Description
POC Badgermeter moni tool - CVE-2024-1302
Readme
# CVE-2024-1302 --- Badgermeter moni tool - Sensitive information exposure
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-badger-meters-monitool

CVE-2024-1302: 7.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N | CWE-200.

**Software link**: https://www.s-can.at/en/product/monitool/

**Version**: 4.6.3

**@author**: Guillermo García Molina

**Description**: In s:can moni:tools up to and including version 4.6.3, an unauthenticated attacker could download log files from the application, obtaining sensitive information stored in them.

## POC

In moni::tools device authenticated menu exists a functionality which purpose is downloading log files. However, it has been discovered that it is not needed to be authenticated to perform these requests and download these files, which are prone to contain sensitive information, such as internal directories or database errors.

In the following picture is shown the request performed to the endpoint log-logfile-download.x including the database log file /var/log/postgresql/postgresql-9.6-main.log in the file parameter. As it could be seen, no cookies are included in the headers request:

![image](https://github.com/guillermogm4/CVE-2024-1302---Badgermeter-moni-tool-Incorrect-Access-Control/assets/26895345/a2635176-5707-4717-843f-bdddf5aa38cd)
 
Once the unauthenticated request is performed, the following server response is received, including the postgresql-9.6-main.log file content.
 
![image](https://github.com/guillermogm4/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure/assets/26895345/f7a86c98-d776-4175-a775-ffc246392f8a)

Therefore, an incorrect access control vulnerability is found, allowing an unauthenticated attacker to download sensitive log files.
File Snapshot

[4.0K] /data/pocs/322f389789bfc334f73ab079ed9e2ad32c1c6811 └── [1.7K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.