Farmer's Fridge Kiosk 2.0.0 Unprotected Event Log Information Disclosure

Title: Farmer's Fridge Kiosk 2.0.0 Unprotected Event Log Information Disclosure
Advisory ID: ZSL-2017-5399
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information, DoS
Risk: (5/5)
Release Date: 26.03.2017
Summary
Don’t think of the Farmer’s Fridge kiosk as a vending machine. It’s a veggie machine. And just as each salad is a culinary thing of beauty, the kiosk is a work of art in its own right. Made from reclaimed wood (provided by Modern Urban Woods of West Chicago) and even some recycled materials, each one is unique and user-friendly.
Description
The kiosk vending machine suffers from personally identifiable information (PII) disclosure vulnerability. By default, the firmware listens on port 9000/tcp as cslistener service using the Play Framework to present some basic information about the system when visiting the interface. The interface is accessed without any authentication system in place. When visited, some server information is disclosed by default and some XML pages for various config and supply information are disclosed, including the ability to reset or reboot the kiosk. One of those options is to show an 'event' type log history page containting various status of temperatures, supply count and transaction details. An attacker can increase the number for the 'days' GET parameter to disclose even more data back in history.

When visiting the root page of the interface the following kiosk information is disclosed:

Version: 2.0.0 Server: PhysicalServer Config: {id=NAME_OF_COMPANY hostname=HOSTNAME location=STREET_ADDRESS, STATE, ZIP serialNumber=serial ip=REMOTE_ADDRESS_OF_KIOSK serialPort=ttyS1 isProd=true useMock=false messageQueue=/usr/share/kiosk-node/conf/queues planogramName=NAME_OF_COMPANY groups=List(KioskGroup(ALL)),route=None} Diagnostics: tools version VIPETL00, temp expiry disabled

When visiting the events page information, the following log history is disclosed in plain-text:

- Date, time and location of the transaction made
- Authorization status on swipe
- Credit card number + CVV
- Name and surname on credit card
- Personal e-mail account
- What was bought and how much it costs
Vendor
Farmer's Fridge - http://www.farmersfridge.com
Affected Version
2.0.0
Tested On
PhysicalServer
nginx/1.6.2
Ubuntu
Vendor Status
[01.03.2017] Vulnerability discovered.
[02.03.2017] Contact US-CERT.
[02.03.2017] US-CERT assigns tracking id VU#762415.
[08.03.2017] US-CERT suggests to contact vendor.
[08.03.2017] Vendor contacted.
[25.03.2017] No response from the vendor.
[26.03.2017] Public security advisory released.
PoC
farmer_kiosk.txt
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] https://cxsecurity.com/issue/WLB-2017030228
[2] https://cxsecurity.com/issue/WLB-2017030244
[3] https://packetstormsecurity.com/files/141822
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/123834
Changelog
[26.03.2017] - Initial release
[31.03.2017] - Added reference [1], [2], [3] and [4]
Contact
Zero Science Lab

Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk