Wowza Streaming Engine 4.5.0 Remote Privilege Escalation Exploit
Title: Wowza Streaming Engine 4.5.0 Remote Privilege Escalation Exploit
Advisory ID: ZSL-2016-5340
Type: Local/Remote
Impact: Privilege Escalation
Risk: (4/5)
Release Date: 19.07.2016
Servlet/2.5 (Winstone/1.0.5)
[09.07.2016] Contact with the vendor.
[18.07.2016] No response from the vendor.
[19.07.2016] Public security advisory released.
[2] https://packetstormsecurity.com/files/137972
[3] https://cxsecurity.com/issue/WLB-2016070156
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/115124
[22.07.2016] - Added reference [1], [2] and [3]
[26.07.2016] - Added reference [4]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2016-5340
Type: Local/Remote
Impact: Privilege Escalation
Risk: (4/5)
Release Date: 19.07.2016
Summary
Wowza Streaming Engine is robust, customizable, and scalable server software that powers reliable video and audio streaming to any device. Learn the benefits of using Wowza Streaming Engine to deliver high-quality live and on-demand video content to any device.Description
The application suffers from a privilege escalation issue. Normal user (read-only) can elevate his/her privileges by sending a POST request seting the parameter 'accessLevel' to 'admin' gaining admin rights and/or setting the parameter 'advUser' to 'true' and '_advUser' to 'on' gaining advanced admin rights.Vendor
Wowza Media Systems, LLC. - https://www.wowza.comAffected Version
4.5.0 (build 18676)Tested On
Winstone Servlet Engine v1.0.5Servlet/2.5 (Winstone/1.0.5)
Vendor Status
[03.07.2016] Vulnerability discovered.[09.07.2016] Contact with the vendor.
[18.07.2016] No response from the vendor.
[19.07.2016] Public security advisory released.
PoC
wowza_rprivs.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://www.exploit-db.com/exploits/40133/[2] https://packetstormsecurity.com/files/137972
[3] https://cxsecurity.com/issue/WLB-2016070156
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/115124
Changelog
[19.07.2016] - Initial release[22.07.2016] - Added reference [1], [2] and [3]
[26.07.2016] - Added reference [4]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk