0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
NPM-V (Network Power Manager) 2.4.1 - Password Reset Vulnerability
NPM-V(Network Power Manager) <= 2.4.1 Reset Password Vulnerability Author: Saeed reza Zamanian [penetrationtest @ Linkedin] Product: NPM-V Affected Version : 2.4.1 and below Vendor : http://www.china-clever.com Product Link : http://www.china-clever.com/en/index.php/product?view=products&cid=125 Date: 2017 Sep 25 Manual: ftp://support.danbit.dk/N/NPOWER8IEC-E/NPM-V%20User%20Manual.pdf [*] NPM Introduction: The NPM(Network Power Manager) is a network manageable device that provides power monitoring, controlling and managements to many equipments in the rack cabinet of data center all over the world through LAN or WAN. For meeting with the restrictions and requirements in different environment, NPM supplies many connection methods that user can manage it through its Web interface(HTTP or HTTPS), Serial connection, Telnet or SNMP [*] Vulnerability Details: Based on security Check on this device , Authentication doesn't check on Device Admin Console an attacker can access to management console pages directly and without authentication. All files in these directories are directly accessible . /log/ /chart /device and /user . [*] PoC: An Attacker can directly access to below page and Add User or View Password or Change Administrator credential without authentication. if you browse this page you will see an html page likely the image exists on Page 13 (Figure 1-4) on Device Users Manual. http://[Device IP]/user/user.html #EOF # 0day.today [2024-11-16] #