![oss-sec logo](/images/oss-sec-logo.png)
oss-sec mailing list archives
libupnp write files via POST
From: Hanno Böck <hanno () hboeck de>
Date: Mon, 18 Jul 2016 20:53:51 +0200
Hi, Wanted to point out this report by Matthew Garret (not sure if there's anything else than a couple of tweets public): https://twitter.com/mjg59/status/755062278513319936 Notable: "Reported this to upstream 8 months ago without response, so: libupnp's default behaviour allows anyone to write to your filesystem" "Seriously. Find a device running a libupnp based server (Shodan says there's rather a lot), and POST a file to /testfile. Then GET /testfile" "…and yeah if the server is running as root (it is) and is using / as the web root (probably not, but maybe) this gives full host fs access" And later on: "Emailed the Debian security team a couple of months ago, no response" Not good... Patch: https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd -- Hanno Böck https://hboeck.de/ mail/jabber: hanno () hboeck de GPG: BBB51E42
Attachment:
_bin
Description: OpenPGP digital signature
Current thread:
- libupnp write files via POST Hanno Böck (Jul 18)
- Re: libupnp write files via POST cve-assign (Jul 20)