oss-sec mailing list archives
DNS rebinding on ReadyMedia/minidlna v1.3.0 and below
From: Gabriel Corona <gabriel.corona () enst-bretagne fr>
Date: Thu, 3 Mar 2022 21:56:42 +0100
ReadyMedia [1] (formerly MiniDLNA) v1.3.0 and below is vulnerable to DNS rebinding attacks. A malicious remote web server may trick the user browser into triggering arbitrary UPnP requests on the local DLNA server and observe the result of these actions. Moreover, the shared files are accessible through DNS rebinding as well.
A remote malicious server could exploit the user browser in order to: * list the available media files and exfiltrate this list; * download the media files and exfiltrate them. This has been fixed in ReadyMedia v1.3.1. [1] https://sourceforge.net/projects/minidlna/ -- Gabriel
Current thread:
- DNS rebinding on ReadyMedia/minidlna v1.3.0 and below Gabriel Corona (Mar 03)
- Re: DNS rebinding on ReadyMedia/minidlna v1.3.0 and below Gabriel Corona (Mar 06)