Serviio PRO 1.8 DLNA Media Streaming Server REST API Arbitrary Password Change

2017-05-03T00:00:00
ID ZSL-2017-5407
Type zeroscience
Reporter Gjoko Krstic
Modified 2017-05-03T00:00:00

Description

Title: Serviio PRO 1.8 DLNA Media Streaming Server REST API Arbitrary Password Change
Advisory ID: ZSL-2017-5407
Type: Local/Remote
Impact: Manipulation of Data, Security Bypass
Risk: (4/5)
Release Date: 03.05.2017

Summary

Serviio is a free media server. It allows you to stream your media files (music, video or images) to renderer devices (e.g. a TV set, Bluray player, games console or mobile phone) on your connected home network.

Description

The version of Serviio installed on the remote Windows/Linux host is affected by an unauthenticated password modification vulnerability due to improper access control enforcement of the Configuration REST API. A remote attacker can exploit this, via a specially crafted request, to change the login password for the mediabrowser protected page.

Vendor

Petr Nejedly | Six Lines Ltd - <http://www.serviio.org>

Affected Version

1.8.0.0 PRO
1.7.1
1.7.0
1.6.1

Tested On

Restlet-Framework/2.2
Windows 7, UPnP/1.0 DLNADOC/1.50, Serviio/1.8
Mac OS X, UPnP/1.0 DLNADOC/1.50, Serviio/1.8
Linux, UPnP/1.0 DLNADOC/1.50, Serviio/1.8

Vendor Status

[12.12.2016] Vulnerability discovered.
[02.05.2017] Vendor communicated via Beyond Security's SecuriTeam Secure Disclosure program.

PoC

serviio_pwd.py

Credits

Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>

References

[1] <https://blogs.securiteam.com/index.php/archives/3094>
[2] <https://www.exploit-db.com/exploits/41960/>
[3] <https://packetstormsecurity.com/files/142386>
[4] <https://cxsecurity.com/issue/WLB-2017050025>
[5] <http://www.securitylab.ru/poc/486047.php>
[6] <https://exchange.xforce.ibmcloud.com/vulnerabilities/125645>

Changelog

[03.05.2017] - Initial release
[05.05.2017] - Added reference [2], [3] and [4]
[08.05.2017] - Added reference [5]
[30.05.2017] - Added reference [6]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: lab@zeroscience.mk

                                        
                                            &lt;html&gt;&lt;head&gt;&lt;title&gt;403 Nothing to see.&lt;/title&gt;
&lt;link rel="Shortcut Icon" href="favicon.ico" type="image/x-icon"&gt;
&lt;style type="text/css"&gt;
&lt;!--
body {
	background-color: #000;
}
body,td,th {
	font-family: Verdana, Geneva, sans-serif;
}
a:link {
	color: #008FEF;
	text-decoration: none;
}
a:visited {
	color: #008FEF;
	text-decoration: none;
}
a:hover {
	text-decoration: underline;
	color: #666;
}
a:active {
	text-decoration: none;
}
--&gt;
&lt;/style&gt;
&lt;/head&gt;
&lt;body bgcolor=black&gt;
&lt;center&gt;
&lt;font color="#7E88A3" size="2"&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;h1&gt;403 Nothing to see.&lt;/h1&gt;

You do not have the powah for this request /403.shtml&lt;br /&gt;&lt;br /&gt;
&lt;font size="2"&gt;&lt;a href="https://www.zeroscience.mk"&gt;https://www.zeroscience.mk&lt;/a&gt;&lt;/font&gt;
&lt;/font&gt;&lt;/center&gt;
&lt;/body&gt;&lt;/html&gt;