Vulnerabilities > Rainmachine
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-11-01 | CVE-2018-6909 | Improper Restriction of Rendered UI Layers or Frames vulnerability in Rainmachine web Application A missing X-Frame-Options header in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application could be used by a remote attacker for clickjacking, as demonstrated by triggering an API page request. | 6.5 |
2018-11-01 | CVE-2018-6908 | Improper Authentication vulnerability in Rainmachine Mini-8 Firmware and Touch HD 12 Firmware An authentication bypass vulnerability exists in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application allowing an unauthenticated attacker to perform authenticated actions on the device via a 127.0.0.1:port value in the HTTP 'Host' header, as demonstrated by retrieving credentials. | 9.8 |
2018-11-01 | CVE-2018-6907 | Cross-Site Request Forgery (CSRF) vulnerability in Rainmachine web Application A Cross Site Request Forgery (CSRF) vulnerability in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application allows an attacker to control the RainMachine device via the REST API. | 8.8 |
2018-11-01 | CVE-2018-6906 | Cross-site Scripting vulnerability in Rainmachine web Application A persistent Cross Site Scripting (XSS) vulnerability in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application allows an attacker to inject arbitrary JavaScript via the REST API. | 6.1 |
2018-11-01 | CVE-2018-6012 | Code Injection vulnerability in Rainmachine Mini-8 Firmware The 'Weather Service' feature of the Green Electronics RainMachine Mini-8 (2nd generation) allows an attacker to inject arbitrary Python code via the 'Add new weather data source' upload function. | 9.8 |
2018-11-01 | CVE-2018-6011 | Improper Authentication vulnerability in Rainmachine Mini-8 Firmware The time-based one-time-password (TOTP) function in the application logic of the Green Electronics RainMachine Mini-8 (2nd generation) uses the administrator's password hash to generate a 6-digit temporary passcode that can be used for remote and local access, aka a "Use of Password Hash Instead of Password for Authentication" issue. | 8.1 |