Wowza Streaming Engine 4.5.0 Cleartext Storage Of Sensitive Information
Title: Wowza Streaming Engine 4.5.0 Cleartext Storage Of Sensitive Information
Advisory ID: ZSL-2016-5342
Type: Local/Remote
Impact: Exposure of Sensitive Information
Risk: (3/5)
Release Date: 19.07.2016
Winstone Servlet Engine v1.0.5
Servlet/2.5 (Winstone/1.0.5)
[09.07.2016] Contact with the vendor.
[18.07.2016] No response from the vendor.
[19.07.2016] Public security advisory released.
[2] https://cxsecurity.com/issue/WLB-2016070154
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/115126
[22.07.2016] - Added reference [1] and [2]
[26.07.2016] - Added reference [3]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2016-5342
Type: Local/Remote
Impact: Exposure of Sensitive Information
Risk: (3/5)
Release Date: 19.07.2016
Summary
Wowza Streaming Engine is robust, customizable, and scalable server software that powers reliable video and audio streaming to any device. Learn the benefits of using Wowza Streaming Engine to deliver high-quality live and on-demand video content to any device.Description
The application stores sensitive information in cleartext within a resource that might be accessible to another control sphere. When the file is modified it is automatically applied into the application with newly created user account. Wowza stores sensitive information such as username and password in cleartext in admin.password file, which is readable by local users.Vendor
Wowza Media Systems, LLC. - https://www.wowza.comAffected Version
4.5.0 (build 18676)Tested On
Microsoft Windows 7 Ultimate SP1 (EN)Winstone Servlet Engine v1.0.5
Servlet/2.5 (Winstone/1.0.5)
Vendor Status
[03.07.2016] Vulnerability discovered.[09.07.2016] Contact with the vendor.
[18.07.2016] No response from the vendor.
[19.07.2016] Public security advisory released.
PoC
wowza_plainstr.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://packetstormsecurity.com/files/137974[2] https://cxsecurity.com/issue/WLB-2016070154
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/115126
Changelog
[19.07.2016] - Initial release[22.07.2016] - Added reference [1] and [2]
[26.07.2016] - Added reference [3]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk