Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-29666 PoC — Lan ATMService M3 ATM 安全漏洞

Source
Associated Vulnerability
Title:Lan ATMService M3 ATM 安全漏洞 (CVE-2020-29666)
Description:Lan ATMService M3 ATM Monitoring System是俄罗斯Lan ATMService公司的一款可用于对ATM机器进行监控的软件。 Lan ATMService M3 ATM 6.1.0存在安全漏洞,攻击者可利用该漏洞可以使用默认的cookie值,来实现对系统会话过期不足的控制。
Readme
# CVE-2020-29666
Directory Listing

[Suggested description]
In Lan ATMService M3 ATM Monitoring System 6.1.0, due to a directory listing vulnerability, a remote attacker can view log files, located in /websocket/logs/, that contain a user's cookie values and the predefined developer's cookie value.
------------------------------------------
[Additional Information]
A letter was sent to the vendor about the vulnerability.
------------------------------------------
[VulnerabilityType Other]
CWE-548: Exposure of Information Through Directory Listing
------------------------------------------
[Vendor of Product]
Lan ATMService LLC (http://lanatmservice.ru/)
------------------------------------------
[Affected Product Code Base]
Affected version: M3 ATM Monitoring System 6.1.0. There are no fixed versions and any response from developers.
------------------------------------------
[Affected Component]
Server misconfiguration, that allows to remote attacker view a user's cookie value in log files.
------------------------------------------
[Attack Type]
Remote
------------------------------------------
[Impact Information Disclosure]
true
------------------------------------------
[Attack Vectors]
A remote attacker can view log files, located in {HOST}/websocket/logs/, that contain a user's cookie values.
------------------------------------------
[Discoverer]
Dmitry Kuramin (Jet Infosystems, jet.su)
------------------------------------------
[Reference]
https://jet.su
File Snapshot

[4.0K] /data/pocs/99567b21bba34afa9b61e4f7d2fa3c197d35c259 ├── [ 49K] dir_listing_proof.jpg └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.