Vulnerabilities (CVE)

Filtered by vendor Rainmachine Subscribe
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-6011 1 Rainmachine 2 Mini-8, Mini-8 Firmware 2024-02-04 6.8 MEDIUM 8.1 HIGH
The time-based one-time-password (TOTP) function in the application logic of the Green Electronics RainMachine Mini-8 (2nd generation) uses the administrator's password hash to generate a 6-digit temporary passcode that can be used for remote and local access, aka a "Use of Password Hash Instead of Password for Authentication" issue. This is exploitable by an attacker who discovers a hash value in the rainmachine-settings.sqlite file.
CVE-2018-6012 1 Rainmachine 2 Mini-8, Mini-8 Firmware 2024-02-04 7.5 HIGH 9.8 CRITICAL
The 'Weather Service' feature of the Green Electronics RainMachine Mini-8 (2nd generation) allows an attacker to inject arbitrary Python code via the 'Add new weather data source' upload function.
CVE-2018-6906 1 Rainmachine 1 Rainmachine Web Application 2024-02-04 4.3 MEDIUM 6.1 MEDIUM
A persistent Cross Site Scripting (XSS) vulnerability in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application allows an attacker to inject arbitrary JavaScript via the REST API.
CVE-2018-6909 1 Rainmachine 1 Rainmachine Web Application 2024-02-04 4.3 MEDIUM 6.5 MEDIUM
A missing X-Frame-Options header in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application could be used by a remote attacker for clickjacking, as demonstrated by triggering an API page request.
CVE-2018-6907 1 Rainmachine 1 Rainmachine Web Application 2024-02-04 6.8 MEDIUM 8.8 HIGH
A Cross Site Request Forgery (CSRF) vulnerability in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application allows an attacker to control the RainMachine device via the REST API.
CVE-2018-6908 1 Rainmachine 4 Mini-8, Mini-8 Firmware, Touch Hd 12 and 1 more 2024-02-04 5.0 MEDIUM 9.8 CRITICAL
An authentication bypass vulnerability exists in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application allowing an unauthenticated attacker to perform authenticated actions on the device via a 127.0.0.1:port value in the HTTP 'Host' header, as demonstrated by retrieving credentials.