iSeeQ Hybrid DVR WH-H4 1.03R / 2.0.0.P (get_jpeg) Stream Disclosure
Title: iSeeQ Hybrid DVR WH-H4 1.03R / 2.0.0.P (get_jpeg) Stream Disclosure
Advisory ID: ZSL-2019-5539
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information
Risk: (3/5)
Release Date: 29.10.2019
PHP/7.0.22
DVR Web Server
[2] https://www.exploit-db.com/exploits/47562
[3] https://cxsecurity.com/issue/WLB-2019100192
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/170650
[31.10.2019] - Added reference [1], [2] and [3]
[01.11.2019] - Added reference [4]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2019-5539
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information
Risk: (3/5)
Release Date: 29.10.2019
Summary
The 4/8/16 channel hybrid standalone DVR delivers high quality pictures which adopts high performance video processing chips and embedded Linux system. This advanced video digital platform is very useful to identify an object from a long distance.Description
The DVR suffers from an unauthenticated and unauthorized live stream disclosure when get_jpeg script is called.Vendor
iSeeQ - http://www.iseeq.co.krAffected Version
WH-H4 1.03R / 2.0.0.PTested On
Boa/0.94.13PHP/7.0.22
DVR Web Server
Vendor Status
N/APoC
iseeq_dvrstream.shCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://packetstormsecurity.com/files/155032[2] https://www.exploit-db.com/exploits/47562
[3] https://cxsecurity.com/issue/WLB-2019100192
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/170650
Changelog
[29.10.2019] - Initial release[31.10.2019] - Added reference [1], [2] and [3]
[01.11.2019] - Added reference [4]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk