Wowza Streaming Engine 4.5.0 CSRF Add Advanced Admin Exploit
Title: Wowza Streaming Engine 4.5.0 CSRF Add Advanced Admin Exploit
Advisory ID: ZSL-2016-5341
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 19.07.2016
Servlet/2.5 (Winstone/1.0.5)
[09.07.2016] Contact with the vendor.
[18.07.2016] No response from the vendor.
[19.07.2016] Public security advisory released.
[2] https://packetstormsecurity.com/files/137973
[3] https://cxsecurity.com/issue/WLB-2016070153
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/115115
[22.07.2016] - Added reference [1], [2] and [3]
[26.07.2016] - Added reference [4]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2016-5341
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 19.07.2016
Summary
Wowza Streaming Engine is robust, customizable, and scalable server software that powers reliable video and audio streaming to any device. Learn the benefits of using Wowza Streaming Engine to deliver high-quality live and on-demand video content to any device.Description
The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.Vendor
Wowza Media Systems, LLC. - https://www.wowza.comAffected Version
4.5.0 (build 18676)Tested On
Winstone Servlet Engine v1.0.5Servlet/2.5 (Winstone/1.0.5)
Vendor Status
[03.07.2016] Vulnerability discovered.[09.07.2016] Contact with the vendor.
[18.07.2016] No response from the vendor.
[19.07.2016] Public security advisory released.
PoC
wowza_csrf.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://www.exploit-db.com/exploits/40134/[2] https://packetstormsecurity.com/files/137973
[3] https://cxsecurity.com/issue/WLB-2016070153
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/115115
Changelog
[19.07.2016] - Initial release[22.07.2016] - Added reference [1], [2] and [3]
[26.07.2016] - Added reference [4]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk