Kunbus-2025-0000001: Authentication Bypass and XSS in PiCtory

TLP: WHITE

Publisher: KUNBUS PSIRT Document category: csaf_security_advisory
Initial release date: 2025-04-01T12:30:00.000Z Engine: csaf-cms-backend 1.0.0
Current release date: 2025-04-01T16:44:15.032752994Z Build Date: 2025-04-01T16:42:25.504Z
Current version: 1.1.0 Status: final
CVSSv3.1 Base Score: 9.8 Severity: Critical
Original language: Language: en-US
Also referred to:

Vulnerabilities

Authentication Bypass in Revolution Pi PiCtory

Summery

PiCtory has an authentication bypass vulnerability. A remote attacker can bypass the authentication to get an authenticated access due to a path traversal.

CWE: CWE-305:Authentication Bypass by Primary Weakness

Product status

Known affected
Product CVSS-Vector CVSS Base Score
KUNBUS Revolution Pi pictory vers:deb/>=2.5.0 | <= 2.11.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.8
Fixed
  • KUNBUS Revolution Pi pictory 2.12

Remediations

Vendor fix (2025-03-31T10:00:00.000Z)

Update PiCtory package to version 2.12

For products:
  • KUNBUS Revolution Pi pictory vers:deb/>=2.5.0 | <= 2.11.1

Acknowledgments

  • Adam Bromiley from Pen Test Partners

Stored Cross-Site Scripting in Revolution Pi PiCtory

Summery

An authenticated remote attacker can craft a special filename that can be stored by API endpoints. That filename is later transmitted to the client in order to show a list of configuration files. Due to a missing escape or sanatization the filename could be executed as html script tag resulting in a cross-site-scripting attack.

CWE: CWE-97:Improper Neutralization of Server-Side Includes (SSI) Within a Web Page

Product status

Known affected
Product CVSS-Vector CVSS Base Score
KUNBUS Revolution Pi PiCtory vers:deb/<=2.11.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H 9
Fixed
  • KUNBUS Revolution Pi pictory 2.12

Remediations

Vendor fix (2025-03-31T10:00:00.000Z)

Update PiCtory package to version 2.12

For products:
  • KUNBUS Revolution Pi PiCtory vers:deb/<=2.11.1

Acknowledgments

  • Adam Bromiley from Pen Test Partners

Reflected Cross-Site Scripting in PiCtory

Summary

PiCtory is vulnerable to a reflected cross-site-scripting attack via the sso_token used for authentication. If an attacker provides the user with a PiCtory url containing an html script as sso_token that script will be replyed to the user and executed.

CWE: CWE-97:Improper Neutralization of Server-Side Includes (SSI) Within a Web Page

Product status

Known affected
Product CVSS-Vector CVSS Base Score
KUNBUS Revolution Pi PiCtory vers:deb/<=2.11.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N 6.1
Fixed
  • KUNBUS Revolution Pi pictory 2.12

Remediations

Vendor fix (2025-03-31T10:00:00.000Z)

Update PiCtory package to version 2.12

For products:
  • KUNBUS Revolution Pi PiCtory vers:deb/<=2.11.1

Acknowledgments

  • Adam Bromiley from Pen Test Partners

Acknowledgments

KUNBUS PSIRT thanks the following parties for their efforts:

  • Adam Bromiley from Pen Test Partners for Found and reported the vulnerabilities

KUNBUS PSIRT

Namespace: https://www.kunbus.com

product-security@kunbus.com

KUNBUS GmbH develops and produces the Revolution Pi Family, Revolution Pi OS and the extension modules for RevPi.

References

Revision history

Version Date of the revision Summary of the revision
1.0.0 2025-04-01T12:30:00.000Z Initial Publication
1.1.0 2025-04-01T16:44:15.032752994Z New Version. Added Issuing authority and switched sharing rules to TLP WHITE.

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/