CVE ID | CVE-2024-4423 |
Publication date | 09 May 2024 |
Vendor | CEMI Tomasz Pawełek |
Product | CemiPark |
Vulnerable versions | 4.5, 4.7, 5.03 and potentially others |
Vulnerability type (CWE) | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89) |
Report source | Report to CERT Polska |
CVE ID | CVE-2024-4424 |
Publication date | 09 May 2024 |
Vendor | CEMI Tomasz Pawełek |
Product | CemiPark |
Vulnerable versions | 4.5, 4.7, 5.03 and potentially others |
Vulnerability type (CWE) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79) |
Report source | Report to CERT Polska |
CVE ID | CVE-2024-4425 |
Publication date | 09 May 2024 |
Vendor | CEMI Tomasz Pawełek |
Product | CemiPark |
Vulnerable versions | 4.5, 4.7, 5.03 and potentially others |
Vulnerability type (CWE) | Plaintext Storage of a Password (CWE-256) |
Report source | Report to CERT Polska |
Description
CERT Polska has received a report about vulnerabilities in CemiPark software and participated in coordination of their disclosure.
The vulnerability CVE-2024-4423 allows the authentication bypass due to improper validation of user-entered data. An attacker who has network access to the login panel can log in with administrator rights to the application.
The vulnerability CVE-2024-4424 allows the stored cross-site scripting (XSS) attack. The access control module does not properly validate user-entered data. The parameters used to enter data into the system do not have appropriate validation, which makes possible to smuggle in HTML/JavaScript code. This code will be executed in the user's browser space.
The vulnerability CVE-2024-4425 is about storing other services, such as FTP or SIP, credentials in plain-text. An attacker who gained unauthorized access to the device can retrieve clear text passwords.
These issues affect CemiPark software: 4.5, 4.7, 5.03 (which were tested by the finder) and potentially others. The vendor refused to provide the specific range of affected products.
Credits
We thank Dariusz Gońda for the responsible vulnerability report.
More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.