ABB IDAL HTTP Server Authentication Bypass Vulnerability

17 June 2019

 

IDENTIFIERS   

 

 

CVE-2019-7226

ABBVU-IAMF-1902005

 

CVSS SCORE

 

8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

 

XID

 

XL-19-010

 

AFFECTED VENDORS

 

ABB (new.abb.com)

 

CREDIT

 

Eldar Marcussen - xen1thLabs - Software Labs

 

VULNERABILITY SUMMARY       

 

The IDAL HTTP server CGI interface contains a URL, which allows an unauthenticated attacker to bypass authentication and gain access to privileged functions.

 

TECHNICAL DETAILS    

 

 

 

 

In the IDAL CGI interface, there is a URL (/cgi/loginDefaultUser), which will create a session in an authenticated state and return the session ID along with the username and plaintext password of the user. An attacker can then login with the provided credentials or supply the string ‘IDALToken=……’ in a cookie which will allow them to perform privileged operations such as restarting the service with /cgi/restart.

 

PROOF OF CONCEPT 

GET http://localhost:81/cgi/loginDefaultUser

 

 

1

#S_OK

IDALToken=532c8632b86694f0232a68a0897a145c

admin

adminpass

HTTP request that bypasses authentication

 

AFFECTED SYSTEMS 

  

PB610 Panel Builder 600, order code: 1SAP500900R0101, versions 1.91 … 2.8.0.367

 

SOLUTION 

 

 

 

Apply the patches and instructions from vendor:

- ABB PB610:

 

DISCLOSURE TIMELINE

 

 

 

04/02/2019 - Contacted ABB requesting disclosure coordination

05/02/2019 - Provided vulnerability details

05/06/2019 – Patch available

17/06/2019 – xen1thLabs public disclosure