ID

VAR-E-201712-0169


CVE

cve_id:CVE-2017-17737

Trust: 1.5

cve_id:CVE-2017-17738

Trust: 1.5

cve_id:CVE-2017-17739

Trust: 1.5

sources: PACKETSTORM: 145489 // EXPLOIT-DB: 43364

EDB ID

43364


TITLE

BrightSign Digital Signage - Multiple Vulnerablities - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 43364

DESCRIPTION

BrightSign Digital Signage - Multiple Vulnerablities. CVE-2017-17739CVE-2017-17738CVE-2017-17737 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 43364

AFFECTED PRODUCTS

vendor:brightsignmodel:digital signagescope: - version: -

Trust: 2.1

sources: PACKETSTORM: 145489 // EXPLOIT-DB: 43364 // EDBNET: 95391

EXPLOIT

# Exploit Title: BrightSign Digital Signage (Multiple Vulnerabilities)
# Date: 12/15/17
# Exploit Author: singularitysec@gmail.com
# Vectors: XSS, Directory Traversal, File Modification, Information Leakage

The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below)
suffers from multiple vulnerabilities.

The pages:

/network_diagnostics.html
/storage_info.html

Suffer from a Cross-Site Scripting vulnerability. The REF parameter for
these pages do not sanitize user input, resulting in arbitrary execution,
token theft and related attacks.

The RP parameter in STORAGE.HTML suffers from a directory
traversal/information leakage weakness:
/storage.html?rp=%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2Fetc

Through parameter manipulation, the file system can be traversed,
unauthenticated, allowing for leakage of information and compromise of the
device.

This page also allows for unauthenticated upload of files.

/tools.html

Page allows for unauthenticated rename/manipulation of files.

When combined, these vulnerabilities allow for compromise of both end users
and the device itself.

Ex. A malicious attacker can upload a malicious page of their choosing and
steal credentials, host malicious content or distribute content through the
device, which accepts large format SD cards.

Trust: 1.0

sources: EXPLOIT-DB: 43364

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 43364

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 43364

TYPE

Multiple Vulnerablities

Trust: 1.6

sources: EXPLOIT-DB: 43364 // EDBNET: 95391

TAGS

tag:exploit

Trust: 0.5

tag:vulnerability

Trust: 0.5

tag:xss

Trust: 0.5

tag:file inclusion

Trust: 0.5

tag:file upload

Trust: 0.5

sources: PACKETSTORM: 145489

CREDITS

Information Paradox

Trust: 0.6

sources: EXPLOIT-DB: 43364

EXTERNAL IDS

db:EXPLOIT-DBid:43364

Trust: 1.6

db:NVDid:CVE-2017-17738

Trust: 1.5

db:NVDid:CVE-2017-17739

Trust: 1.5

db:NVDid:CVE-2017-17737

Trust: 1.5

db:EDBNETid:95391

Trust: 0.6

db:PACKETSTORMid:145489

Trust: 0.5

sources: PACKETSTORM: 145489 // EXPLOIT-DB: 43364 // EDBNET: 95391

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2017-17739

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2017-17738

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2017-17737

Trust: 1.5

url:https://www.exploit-db.com/exploits/43364/

Trust: 0.6

sources: PACKETSTORM: 145489 // EXPLOIT-DB: 43364 // EDBNET: 95391

SOURCES

db:PACKETSTORMid:145489
db:EXPLOIT-DBid:43364
db:EDBNETid:95391

LAST UPDATE DATE

2022-07-27T10:00:37.053000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:145489date:2017-12-19T14:26:57
db:EXPLOIT-DBid:43364date:2017-12-19T00:00:00
db:EDBNETid:95391date:2017-12-19T00:00:00