Description
MiniDVBLinux 5.4 contains an unauthenticated configuration download vulnerability that allows remote attackers to access sensitive system configuration files through a direct object reference. Attackers can exploit the backup download endpoint by sending a GET request with 'action=getconfig' to retrieve a complete system configuration archive containing sensitive credentials.
Problem types
CWE-260: Password in Configuration File
Product status
<=5.4
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.exploit-db.com/exploits/51091 (ExploitDB-51091)
www.minidvblinux.de (Official Product Homepage)
www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5713.php (Zero Science Lab Disclosure (ZSL-2022-5713))
www.vulncheck.com/...figuration-download-via-backup-endpoint (VulnCheck Advisory: MiniDVBLinux 5.4 Unauthenticated Configuration Download via Backup Endpoint)