Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-19393 PoC — Rittal CMC PU III 跨站脚本漏洞

Source
Associated Vulnerability
Title:Rittal CMC PU III 跨站脚本漏洞 (CVE-2019-19393)
Description:Rittal Chiller SK 3232-Series是德国威图(Rittal)公司的一款液体冷却设备。 Rittal CMC PU III 7030.000存在跨站脚本漏洞,该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。以下产品及版本受到影响: V3.00版本,V3.11.00版本, 2版本到3.15.70 4版本。
Readme
# Rittal CMC PU III – Stored XSS PoC

**Application:** Rittal CMC PU III Web management

**Devices:** CMC PU III 7030.000

**Software Revision:** From V3.11.00_2 to V3.15.70_4

**Hardware Revision:** From V3.00 to V6.01

**Attack type:** Stored XSS

**Solution:** Update to Software Revision V3.17.10 or later

**Summary:** Web application fails to sanitize user input on system configurations page. This allows attacker
to backdoor the device with HTML and browser interpreted content (such as JS or other client-side scripts) as
the content is displayed always after and before login. Persistent XSS allows attacker to modify displayed
content or to change the victim's information. Successful exploitation requires access to the web management
interface either with valid credentials or hijacked session.

**Technical Description:** See CVE-2019-19393.pdf

**Timeline:**
   * 2019-11-11 Issues discovered
   * 2019-11-28 First contact with vendor via e-mail
   * 2020-03-02 Second contact with vendor via e-mail
   * 2020-03-02 Vendor response. XSS vulnerabilities were already detected, and would be patched in the next release
   * 2020-08-20 New Software Version release. V3.17.10   
   * 2020-09-28 Vulnerability patch confirmed   
File Snapshot

[4.0K] /data/pocs/e64d2b8a48e6b396e033e097eb5bf69d7089401b ├── [1.4M] CVE-2019-19393.pdf └── [1.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.