TrueConf Server v4.3.7 Multiple Remote Web Vulnerabilities

Title: TrueConf Server v4.3.7 Multiple Remote Web Vulnerabilities
Advisory ID: ZSL-2017-5393
Type: Local/Remote
Impact: Cross-Site Scripting, Spoofing
Risk: (4/5)
Release Date: 29.01.2017
Summary
TrueConf Server is a powerful, high-quality and highly secured video conferencing software server. It is specially designed to work with up to 250 participants in a multipoint conference over LAN or VPN networks. TrueConf Server requires no hardware and includes client applications for all popular platforms, making it an easy-to-set up, unified communications solution.
Description
The administration interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

Input passed via the 'redirect_url' GET parameter is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

TrueConf also suffers from multiple stored, reflected and DOM XSS issues when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Vendor
TrueConf LLC - https://www.trueconf.com
Affected Version
4.3.7.12255
4.3.7.12219
Tested On
Microsoft Windows 7 Professional SP1 (EN)
Apache/2.4.17 (Win32)
PHP/5.4.41
Vendor Status
[24.03.2023] Vendor provides fixes in TrueConf Server 5.0.2.
PoC
trueconf_mv.txt
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] https://www.exploit-db.com/exploits/41184/
[2] https://cxsecurity.com/issue/WLB-2017010231
[3] https://packetstormsecurity.com/files/140808
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/121476
[5] https://exchange.xforce.ibmcloud.com/vulnerabilities/121477
[6] https://exchange.xforce.ibmcloud.com/vulnerabilities/121478
[7] https://exchange.xforce.ibmcloud.com/vulnerabilities/230138
[8] https://exchange.xforce.ibmcloud.com/vulnerabilities/230137
[9] https://exchange.xforce.ibmcloud.com/vulnerabilities/230140
[10] https://exchange.xforce.ibmcloud.com/vulnerabilities/230139
[11] https://exchange.xforce.ibmcloud.com/vulnerabilities/230136
[12] https://bdu.fstec.ru/vul/2022-04036
[13] https://bdu.fstec.ru/vul/2022-04037
[14] https://bdu.fstec.ru/vul/2022-04035
[15] https://bdu.fstec.ru/vul/2022-04038
[16] https://bdu.fstec.ru/vul/2022-04034
[17] https://bdu.fstec.ru/vul/2022-04089
[18] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20113
[19] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20114
[20] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20115
[21] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20116
[22] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20117
[23] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20118
[24] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20119
[25] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20120
[26] https://nvd.nist.gov/vuln/detail/CVE-2017-20113
[27] https://nvd.nist.gov/vuln/detail/CVE-2017-20114
[28] https://nvd.nist.gov/vuln/detail/CVE-2017-20115
[29] https://nvd.nist.gov/vuln/detail/CVE-2017-20116
[30] https://nvd.nist.gov/vuln/detail/CVE-2017-20117
[31] https://nvd.nist.gov/vuln/detail/CVE-2017-20118
[32] https://nvd.nist.gov/vuln/detail/CVE-2017-20119
[33] https://nvd.nist.gov/vuln/detail/CVE-2017-20120
[34] https://trueconf.com/products/server/changelog.html
Changelog
[29.01.2017] - Initial release
[01.02.2017] - Added reference [1], [2] and [3]
[09.02.2017] - Added reference [4], [5] and [6]
[24.03.2023] - Added vendor status and reference [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33] and [34]
Contact
Zero Science Lab

Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk