Description
QiHang Media Web Digital Signage 3.0.9 contains a cleartext credentials vulnerability that allows unauthenticated attackers to access administrative login information through an unprotected XML file. Attackers can retrieve hardcoded admin credentials by requesting the '/xml/User/User.xml' file, enabling direct authentication bypass.
Problem types
CWE-522: Insufficiently Protected Credentials
Product status
3.0.9
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5579.php
www.exploit-db.com/exploits/48748 (ExploitDB-48748)
www.howfor.com (Official Product Homepage)
www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5579.php (Vendor Security Advisory for ZSL-2020-5579)
www.vulncheck.com/...ignage-cleartext-credentials-disclosure (VulnCheck Advisory: QiHang Media Web Digital Signage 3.0.9 Cleartext Credentials Disclosure)