Ulnerability in
ASIC Miners Innosilicon allows you to bypass the administrator password check and change the pool settings.
Attack is done through the web panel. By default, you need to go to the /html/generalsetup.html page to configure the pool, if you were not previously authorized, you will be automatically transferred to the /html/login.html login page.
When examining the pool settings page /html/generalsetup.html, the following code was found:
var islogin = getcookie('login');
if(!islogin){
window.location.href='login.html';
}
This javascript code checks the presence of the 'login' cookie in the user's browser, if the cookie is not present, then redirects to the Login page.
By adding the cookie name = '
login' value = '
true' manually, you can bypass the administrator password check and change the pool settings.
This vulnerability exists on all versions of Innosilicon ASIC firmware with this interface:
http://ipic.su/img/img7/fs/asic.1519071360.jpgTo search for ASIC, it is possible to use censys.io with the query 'Miner Console'
http://ipic.su/img/img7/fs/minerconsole.1519071271.jpgPlease donate:
BTC
1DJKmpCVGqyDZ2XgjQxKJgVa7V1JrJ3qAjLTC
LgAJKkXT8GHSdwbb3qVWkaWfJbgLxetfqH