Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-30765 PoC — Delta Electronics InfraSuite Device Master 访问控制错误漏洞

Source
Associated Vulnerability
Title:Delta Electronics InfraSuite Device Master 访问控制错误漏洞 (CVE-2023-30765)
Description:Delta Electronics InfraSuite Device Master是中国台湾台达电子(Delta Electronics)公司的用于简化和自动化关键设备监控的设备。 Delta Electronics InfraSuite Device Master 1.0.7之前版本存在访问控制错误漏洞,该漏洞源于访问控制不正确。攻击者利用该漏洞可以更改权限管理配置,从而导致权限升级。
Description
CVE-2023-30765 / ZDI-23-905 -  Delta Electronics Infrasuite Device Master Privilege Escalation
Readme
# CVE-2023-30765
CVE-2023-30765 / ZDI-23-905 -  Delta Electronics Infrasuite Device Master Privilege Escalation

Bug credit: Piotr Bazydlo (@chudypb) <br>
Links:
  - https://www.zerodayinitiative.com/advisories/ZDI-23-905/
  - https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-01

### Usage
```
python3 cve-2023-30765.py -h
usage: cve-2023-30765.py [-h] -i TARGET [-p PORT] [-t] [--user USER] [--pass PWD] [-b]

Delta Electronics Infrasuite Device Master Privilege Escalation (CVE-2023-30765)

optional arguments:
  -h, --help            show this help message and exit
  -i TARGET, --target TARGET
                        Target Infrasuite instance
  -p PORT, --port PORT  Target webservice port (default:80)
  -t, --tls             Target webservice has tls (default:false)
  --user USER           Account to escalate
  --pass PWD            Account password
  -b, --brute           Brute-force default user:pass pairs
```
### FYI
Couldnt find a way to enumerate group contents so this just adds the given user to the admins group with the original administrator. Might be temperamental for other users in that group. ymmv, yolo. 
File Snapshot

[4.0K] /data/pocs/abfc4b22a0fb46ea00b2507da113b8a4f07ab083 ├── [8.6K] cve-2023-30765.py └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.