Skip to content

Commit 7151930

Browse files
committed
Update md doc
1 parent 72b654c commit 7151930

File tree

1 file changed

+16
-1
lines changed

1 file changed

+16
-1
lines changed

documentation/modules/auxiliary/gather/advantech_webaccess_creds.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,16 @@
11
## Description
22

3-
This module allows you to log into Advantech WebAccess, and gather credentials from the user list.
3+
This module exploits three vulnerabilities in Advantech WebAccess.
4+
5+
The first vulnerability is the ability for an arbitrary user to access the admin user list page,
6+
revealing the username of every user on the system.
7+
8+
The second vulnerability is the user edit page can be accessed loaded by an arbitrary user, with
9+
the data of an arbitrary user.
10+
11+
The final vulnerability exploited is that the HTML Form on the user edit page contains the user's
12+
plain text password in the masked password input box. Typically the system should replace the
13+
actual password with a masked character such as "*".
414

515

616
## Vulnerable Application
@@ -30,3 +40,8 @@ The username to use to log into Advantech WebAccess. By default, there is a buil
3040

3141
The password to use to log into AdvanTech WebAccess. By default, the built-in account ```admin```
3242
does not have a password, which could be something you can use.
43+
44+
45+
## Demo
46+
47+
![webaccess_steal_creds](https://cloud.githubusercontent.com/assets/1170914/22353246/34b2045e-e3e5-11e6-992c-f3ab9dcbe716.gif)

0 commit comments

Comments
 (0)