Serviio PRO 1.8 DLNA Media Streaming Server (mediabrowser) XSS

2017.05.04
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

Serviio PRO 1.8 DLNA Media Streaming Server (mediabrowser) DOM Based XSS Vendor: Petr Nejedly | Six Lines Ltd Product web page: http://www.serviio.org Affected version: 1.8.0.0 PRO, 1.7.1, 1.7.0, 1.6.1 Summary: Serviio is a free media server. It allows you to stream your media files (music, video or images) to renderer devices (e.g. a TV set, Bluray player, games console or mobile phone) on your connected home network. Desc: The application is vulnerable to a DOM-based cross-site scripting. Data is read from document.location and passed to document.write() via the following statement in the response: document.write('<base href="' + document.location + '" />'); This can be exploited to execute arbitrary HTML and script code in a user's browser DOM in context of an affected site. Tested on: Restlet-Framework/2.2 Windows 7, UPnP/1.0 DLNADOC/1.50, Serviio/1.8 Mac OS X, UPnP/1.0 DLNADOC/1.50, Serviio/1.8 Linux, UPnP/1.0 DLNADOC/1.50, Serviio/1.8 Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2017-5406 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5406.php SSD Advisory: https://blogs.securiteam.com/index.php/archives/3094 12.12.2016 -- Request: http://172.19.0.214:23424/mediabrowser/#/browse/V_F?title=Folders&b=Home&b=Video&bid=0"><script>alert("ZSL")</script> Element response: <base href="http://172.19.0.214:23424/mediabrowser/#/login?title=Folders&amp;b=Home&amp;b=Video&amp;bid=0%22%3E%3Cscript%3Ealert(%22ZSL%22)%3C%2Fscript%3E">

References:

http://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5406.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top