← Advisories

Farmer's Fridge Kiosk 2.0.0 Unprotected Event Log Information Disclosure

Critical
Advisory ID
ZSL-2017-5399
Release Date
26 March 2017
Vendor
Affected Version
2.0.0
CVE
N/A
Tested On
PhysicalServer, nginx/1.6.2, Ubuntu
Summary

Don’t think of the Farmer’s Fridge kiosk as a vending machine. It’s a veggie machine. And just as each salad is a culinary thing of beauty, the kiosk is a work of art in its own right. Made from reclaimed wood (provided by Modern Urban Woods of West Chicago) and even some recycled materials, each one is unique and user-friendly.

Description

The kiosk vending machine suffers from personally identifiable information (PII) disclosure vulnerability. By default, the firmware listens on port 9000/tcp as cslistener service using the Play Framework to present some basic information about the system when visiting the interface. The interface is accessed without any authentication system in place. When visited, some server information is disclosed by default and some XML pages for various config and supply information are disclosed, including the ability to reset or reboot the kiosk. One of those options is to show an 'event' type log history page containting various status of temperatures, supply count and transaction details. An attacker can increase the number for the 'days' GET parameter to disclose even more data back in history.

When visiting the root page of the interface the following kiosk information is disclosed:

Version: 2.0.0 Server: PhysicalServer Config: {id=NAME_OF_COMPANY hostname=HOSTNAME location=STREET_ADDRESS, STATE, ZIP serialNumber=serial ip=REMOTE_ADDRESS_OF_KIOSK serialPort=ttyS1 isProd=true useMock=false messageQueue=/usr/share/kiosk-node/conf/queues planogramName=NAME_OF_COMPANY groups=List(KioskGroup(ALL)),route=None} Diagnostics: tools version VIPETL00, temp expiry disabled

When visiting the events page information, the following log history is disclosed in plain-text:

- Date, time and location of the transaction made - Authorization status on swipe - Credit card number + CVV - Name and surname on credit card - Personal e-mail account - What was bought and how much it costs

Proof of Concept
Disclosure Timeline
01.03.2017Vulnerability discovered.
02.03.2017Contact US-CERT.
02.03.2017US-CERT assigns tracking id VU#762415.
08.03.2017US-CERT suggests to contact vendor.
08.03.2017Vendor contacted.
25.03.2017No response from the vendor.
26.03.2017Public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
26.03.2017Initial release
31.03.2017Added reference [1], [2], [3] and [4]