CVE-2022-33174

Power Distribution Units running on Powertek firmware (multiple brands) before 3.30.30 allows remote authorization bypass in the web interface. To exploit the vulnerability, an attacker must send an HTTP packet to the data retrieval interface (/cgi/get_param.cgi) with the tmpToken cookie set to an empty string followed by a semicolon. This bypasses an active session authorization check. This can be then used to fetch the values of protected sys.passwd and sys.su.name fields that contain the username and password in cleartext.
References
Link Resource
https://gynvael.coldwind.pl/?lang=en&id=748 Exploit Third Party Advisory
https://gynvael.coldwind.pl/?lang=en&id=748 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:powertekpdus:basic_pdu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:basic_pdu:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:powertekpdus:pm_pdu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:pm_pdu:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:powertekpdus:piml_pdu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:piml_pdu:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:powertekpdus:smart_pim_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:smart_pim:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:powertekpdus:smart_pos_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:smart_pos:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:powertekpdus:smart_pom_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:smart_pom:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:powertekpdus:smart_poms_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:smart_poms:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:07

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 9.8
References () https://gynvael.coldwind.pl/?lang=en&id=748 - Exploit, Third Party Advisory () https://gynvael.coldwind.pl/?lang=en&id=748 - Exploit, Third Party Advisory

27 Jun 2022, 16:45

Type Values Removed Values Added
CPE cpe:2.3:o:powertekpdus:smart_pim_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:powertekpdus:basic_pdu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:piml_pdu:-:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:smart_poms:-:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:basic_pdu:-:*:*:*:*:*:*:*
cpe:2.3:o:powertekpdus:piml_pdu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:powertekpdus:pm_pdu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:smart_pom:-:*:*:*:*:*:*:*
cpe:2.3:o:powertekpdus:smart_poms_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:pm_pdu:-:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:smart_pim:-:*:*:*:*:*:*:*
cpe:2.3:o:powertekpdus:smart_pos_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:powertekpdus:smart_pom_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:powertekpdus:smart_pos:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
References (MISC) https://gynvael.coldwind.pl/?lang=en&id=748 - (MISC) https://gynvael.coldwind.pl/?lang=en&id=748 - Exploit, Third Party Advisory
CWE CWE-863

13 Jun 2022, 18:22

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-13 18:15

Updated : 2024-11-21 07:07


NVD link : CVE-2022-33174

Mitre link : CVE-2022-33174

CVE.ORG link : CVE-2022-33174


JSON object : View

Products Affected

powertekpdus

  • piml_pdu_firmware
  • basic_pdu_firmware
  • smart_poms
  • smart_pos
  • smart_pom_firmware
  • piml_pdu
  • pm_pdu_firmware
  • smart_pim
  • smart_poms_firmware
  • smart_pim_firmware
  • smart_pom
  • pm_pdu
  • basic_pdu
  • smart_pos_firmware
CWE
CWE-863

Incorrect Authorization