Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Solar-Log 500 2.8.2 - Incorrect Access Control

By kannthu

High
Vidoc logoVidoc Module
#solarlog#auth-bypass#edb
Description

Solar-Log 500 2.8.2 - Incorrect Access Control

What is the "Solar-Log 500 2.8.2 - Incorrect Access Control?"

The "Solar-Log 500 2.8.2 - Incorrect Access Control" module is designed to detect a vulnerability in the Solar-Log 500 software. This module focuses on identifying instances where the software has incorrect access control, which can potentially lead to unauthorized access and compromise of the system. The severity of this vulnerability is classified as high, indicating the potential for significant impact if exploited.

Impact

If the Solar-Log 500 software is found to have incorrect access control, it can allow unauthorized individuals to gain access to sensitive information or perform unauthorized actions within the system. This can lead to data breaches, unauthorized system modifications, and potential disruption of critical operations.

How the module works?

The module works by sending HTTP requests to the target system and analyzing the responses based on predefined matching conditions. In this case, the module sends a GET request to the "/lan.html" path and checks for specific conditions to determine if the Solar-Log 500 software is present and if it exhibits signs of incorrect access control.

The matching conditions include:

- Checking if the response status is 200 (indicating a successful request) - Verifying if the response header contains the word "IPC@CHIP" - Searching for specific words in the response body, such as "Solare Datensysteme GmbH" and "mailto:[email protected]"

If all of these conditions are met, the module will report a vulnerability related to incorrect access control in the Solar-Log 500 software.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/lan.html
Matching conditions
status: 200and
word: IPC@CHIPand
word: Solare Datensysteme GmbH, mailto:info@s...
Passive global matcher
No matching conditions.
On match action
Report vulnerability