Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Multiple Vulnerabilities in LandAirSea SilverCloud GPS Platform

Medium

Synopsis

Note:  The following vulnerabilities were specifically discovered in the LandAirSea Silvercloud web platform, not the mobile application.

1. ShareSpot IDOR allows unauthenticated users to see all shared maps

Via sharespot.aspx preview link
While the final link generated for the ShareSpot feature uses a token which would be hard to guess or bruteforce, the ShareSpot preview link only uses what appears to be a sequential sid, and is affected by an insecure direct object reference (IDOR) vulnerability.
Via geojson.aspx shareinit action

The sharespot data can also be revealed by unauthenticated attackers more directly via an IDOR in the geojson.aspx page.

2. Reveal location of any device via action-setSharespot.htm

An authenticated attacker can add any device they choose, including those they do not own, to a ShareSpot map with a specially crafted request, and can add multiple devices.
This will create a sharespot in the attacker’s account containing a map with the locations of those devices.

3. Account management IDOR allows authenticated attacker to view/edit any user’s email/password/other information 

An IDOR vulnerability exists in the edit user page which could allow an attacker to view and change any users' password and other personal information.

4. Edit account details via IDOR in action-saveUser.htm

An IDOR vulnerability exists in the action-saveUser page POST parameters, allowing an attacker to alter other users' account details.

Solution

Please contact LandAirSea for more information and support. At the time of publishing, issue 3 had been fixed, however the other vulnerabilities still remained.

Disclosure Timeline

June 8, 2021 - Tenable reaches out to LandAirSea, requesting security contact
June 8, 2021 - Tenable receives automated support ticket, but no further response
June 15, 2021 - Tenable reports vulnerabilities to LandAirSea support.
June 15, 2021 - Tenable receives automated support ticket, but no further response
July 14, 2021 - Tenable requests an update, receives no response
August 24, 2021 - Tenable sends email to LandAirSea support reminding them of disclosure date
September 14, 2021 - Advisory published

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID: TRA-2021-36
Credit:
Evan Grant
Affected Products:
LandAirSea SilverCloud GPS Platform
Risk Factor:
Medium

Advisory Timeline

September 14, 2021 - Initial Release