Selea CarPlateServer (CPS) v4.0.1.6 Remote Program Execution
Title: Selea CarPlateServer (CPS) v4.0.1.6 Remote Program Execution
Advisory ID: ZSL-2021-5622
Type: Local/Remote
Impact: System Access, Cross-Site Scripting, Security Bypass, DoS
Risk: (4/5)
Release Date: 21.01.2021
4.013(201105)
3.100(200225)
3.005(191206)
3.005(191112)
SeleaCPSHttpServer/1.1
[09.11.2020] Vendor contacted.
[09.11.2020] Vendor responds asking for explanation.
[09.11.2020] Asked vendor for security personnel and explained about security submissions and risk/impact.
[10.11.2020] Vendor responds asking for details.
[11.11.2020] Sent details to the vendor (high-level, asked for PGP).
[14.11.2020] Asked vendor for status update.
[18.11.2020] Vendor responds: We already reviewed and fixed most of the vulnerabilities you described in newer version of both camera firmware and the CarPlateServer software.
[19.11.2020] Replied to the vendor.
[20.11.2020] Vendor will get back to us.
[06.12.2020] Asked vendor for status update.
[09.12.2020] Vendor in final test phase for new releases. Estimated release date: End of year.
[09.12.2020] Replied to the vendor.
[17.01.2021] Asked vendor for status update.
[20.01.2021] No response from the vendor.
[21.01.2021] Public security advisory released.
[2] https://packetstormsecurity.com/files/161068
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/195506
[26.01.2021] - Added reference [1], [2] and [3]
Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2021-5622
Type: Local/Remote
Impact: System Access, Cross-Site Scripting, Security Bypass, DoS
Risk: (4/5)
Release Date: 21.01.2021
Summary
Our CPS (Car Plate Server) software is an advanced solution that can be installed on computers and servers and used as an operations centre. It can create sophisticated traffic control and road safety systems connecting to stationary, mobile or vehicle-installed ANPR systems. CPS allows to send alert notifications directly to tablets or smartphones, it can receive and transfer data through safe encrypted protocols (HTTPS and FTPS). CPS is an open solution that offers full integration with main video surveillance software. Our CPS software connects to the national operations centre and provides law enforcement authorities with necessary tools to issue alerts. CPS is designed to guarantee cooperation among different law enforcement agencies. It allows to create a multi-user environment that manages different hierarchy levels and the related division of competences.Description
The server suffers from an arbitrary win32/64 binary executable execution when setting the NO_LIST_EXE_PATH variable to a program of choice. The command will be executed if proper trigger criteria is met. It can be exploited via CSRF or by navigating to /cps/ endpoint from the camera IP and bypass authentication gaining the ability to modify the running configuration including changing the password of admin and other users.Vendor
Selea s.r.l. - https://www.selea.comAffected Version
4.0.1.6(210120)4.013(201105)
3.100(200225)
3.005(191206)
3.005(191112)
Tested On
Microsoft Windows 10 EnterpriseSeleaCPSHttpServer/1.1
Vendor Status
[07.11.2020] Vulnerability discovered.[09.11.2020] Vendor contacted.
[09.11.2020] Vendor responds asking for explanation.
[09.11.2020] Asked vendor for security personnel and explained about security submissions and risk/impact.
[10.11.2020] Vendor responds asking for details.
[11.11.2020] Sent details to the vendor (high-level, asked for PGP).
[14.11.2020] Asked vendor for status update.
[18.11.2020] Vendor responds: We already reviewed and fixed most of the vulnerabilities you described in newer version of both camera firmware and the CarPlateServer software.
[19.11.2020] Replied to the vendor.
[20.11.2020] Vendor will get back to us.
[06.12.2020] Asked vendor for status update.
[09.12.2020] Vendor in final test phase for new releases. Estimated release date: End of year.
[09.12.2020] Replied to the vendor.
[17.01.2021] Asked vendor for status update.
[20.01.2021] No response from the vendor.
[21.01.2021] Public security advisory released.
PoC
selea_csp_rce.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://www.exploit-db.com/exploits/49452[2] https://packetstormsecurity.com/files/161068
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/195506
Changelog
[21.01.2021] - Initial release[26.01.2021] - Added reference [1], [2] and [3]
Contact
Zero Science LabWeb: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk