CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to execute arbitrary code and obtain sensitive information via a GET request to a UserService SOAP API endpoint to validate if a user exists.
Analysis
CVE-2023-47030 is a critical remote code execution vulnerability in NCR Terminal Handler v1.5.1 that allows unauthenticated attackers to execute arbitrary code and access sensitive information through improper input validation in the UserService SOAP API endpoint. The vulnerability affects point-of-sale and terminal systems used in retail and hospitality environments, enabling complete system compromise without authentication or user interaction.
Technical Context
The vulnerability exists in NCR Terminal Handler's UserService SOAP API endpoint, which implements user existence validation via GET requests without proper input sanitization. The root cause is CWE-94 (Code Injection), indicating that user-supplied input from the GET request is directly interpreted as code without validation or encoding. SOAP (Simple Object Access Protocol) endpoints are common attack surfaces when they accept untrusted input for object manipulation. The vulnerable endpoint fails to properly sanitize parameters passed during user validation checks, allowing attackers to inject malicious code that executes within the terminal handler's security context. This is exacerbated by the SOAP framework's reliance on serialization/deserialization of complex objects, which can be exploited to instantiate arbitrary classes or execute functions.
Affected Products
Terminal Handler (['1.5.1'])
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2023-51186