Wowza Streaming Engine 4.5.0 Cleartext Storage Of Sensitive Information

2016-07-19T00:00:00
ID ZSL-2016-5342
Type zeroscience
Reporter Gjoko Krstic
Modified 2016-07-19T00:00:00

Description

Title: Wowza Streaming Engine 4.5.0 Cleartext Storage Of Sensitive Information
Advisory ID: ZSL-2016-5342
Type: Local/Remote
Impact: Exposure of Sensitive Information
Risk: (3/5)
Release Date: 19.07.2016

Summary

Wowza Streaming Engine is robust, customizable, and scalable server software that powers reliable video and audio streaming to any device. Learn the benefits of using Wowza Streaming Engine to deliver high-quality live and on-demand video content to any device.

Description

The application stores sensitive information in cleartext within a resource that might be accessible to another control sphere. When the file is modified it is automatically applied into the application with newly created user account. Wowza stores sensitive information such as username and password in cleartext in admin.password file, which is readable by local users.

Vendor

Wowza Media Systems, LLC. - <https://www.wowza.com>

Affected Version

4.5.0 (build 18676)

Tested On

Microsoft Windows 7 Ultimate SP1 (EN)
Winstone Servlet Engine v1.0.5
Servlet/2.5 (Winstone/1.0.5)

Vendor Status

[03.07.2016] Vulnerability discovered.
[09.07.2016] Contact with the vendor.
[18.07.2016] No response from the vendor.
[19.07.2016] Public security advisory released.

PoC

wowza_plainstr.txt

Credits

Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>

References

[1] <https://packetstormsecurity.com/files/137974>
[2] <https://cxsecurity.com/issue/WLB-2016070154>
[3] <https://exchange.xforce.ibmcloud.com/vulnerabilities/115126>

Changelog

[19.07.2016] - Initial release
[22.07.2016] - Added reference [1] and [2]
[26.07.2016] - Added reference [3]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: lab@zeroscience.mk

                                        
                                            &lt;html&gt;&lt;head&gt;&lt;title&gt;403 Nothing to see.&lt;/title&gt;
&lt;link rel="Shortcut Icon" href="favicon.ico" type="image/x-icon"&gt;
&lt;style type="text/css"&gt;
&lt;!--
body {
	background-color: #000;
}
body,td,th {
	font-family: Verdana, Geneva, sans-serif;
}
a:link {
	color: #008FEF;
	text-decoration: none;
}
a:visited {
	color: #008FEF;
	text-decoration: none;
}
a:hover {
	text-decoration: underline;
	color: #666;
}
a:active {
	text-decoration: none;
}
--&gt;
&lt;/style&gt;
&lt;/head&gt;
&lt;body bgcolor=black&gt;
&lt;center&gt;
&lt;font color="#7E88A3" size="2"&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;h1&gt;403 Nothing to see.&lt;/h1&gt;

You do not have the powah for this request /403.shtml&lt;br /&gt;&lt;br /&gt;
&lt;font size="2"&gt;&lt;a href="https://www.zeroscience.mk"&gt;https://www.zeroscience.mk&lt;/a&gt;&lt;/font&gt;
&lt;/font&gt;&lt;/center&gt;
&lt;/body&gt;&lt;/html&gt;