id: solar-log-authbypass info: name: Solar-Log 500 2.8.2 - Incorrect Access Control author: geeknik severity: high description: Solar-Log 500 2.8.2 is susceptible to incorrect access control because the web administration server for Solar-Log 500 all versions prior to 2.8.2 Build 52 does not require authentication, which allows arbitrary remote attackers gain administrative privileges by connecting to the server. reference: - https://www.exploit-db.com/exploits/49986 classification: cwe-id: CWE-284 metadata: max-request: 1 tags: solarlog,auth-bypass,edb http: - method: GET path: - "{{BaseURL}}/lan.html" matchers-condition: and matchers: - type: status status: - 200 - type: word part: header words: - "IPC@CHIP" - type: word part: body words: - " Solare Datensysteme GmbH" - "mailto:info@solar-log.com" condition: and # digest: 4a0a00473045022100befc1d4bf898609aed2567951ef9d96923407a7ac74979b6969d38b7e0d2295702200e9232cb6c80aebd34b60aa9dc6af19437484593d9a84e0af8b06fbd584053d4:922c64590222798bb761d5b6d8e72950