Security
Headlines
HeadlinesLatestCVEs

Source

Zero Science Lab

SOUND4 IMPACT/FIRST/PULSE/Eco 2.x (username) Stored Cross-Site Scripting

The application suffers from an unauthenticated stored XSS vulnerability that results in stored JS code and authentication bypass. The issue is triggered when input passed to the 'username' parameter is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Zero Science Lab
#xss#vulnerability#web#linux#apache#js#git#php#perl#auth#ssl
SOUND4 IMPACT/FIRST/PULSE/Eco 2.x Directory Traversal File Write Exploit

The application suffers from an unauthenticated directory traversal file write vulnerability. Input passed through the 'filename' POST parameter called by the 'upgrade.php' script is not properly verified before being used to upload .upgbox Firmware files. This can be exploited to write to arbitrary locations on the system via directory traversal attacks.

SOUND4 IMPACT/FIRST/PULSE/Eco 2.x (sound4server) Hardcoded Credentials

The server binary has hard-coded credentials within its Linux and Windows distribution image. These sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the device. To add/modify other credentials you need to use the SOUND4 Remote Control thick client.

SOUND4 IMPACT/FIRST/PULSE/Eco 2.x (ping/traceroute) ICMP Flood Attack

The application allows an unauthenticated attacker to send network signals to an arbitrary target host that can be abused in an ICMP flooding attack. This includes the utilisation of the ping, traceroute and nslookup commands through ping.php, traceroute.php and dns.php respectively.

Spitfire CMS 1.0.475 (cms_backup_values) PHP Object Injection

The application is prone to a PHP Object Injection vulnerability due to the unsafe use of unserialize() function. A potential attacker, authenticated, could exploit this vulnerability by sending specially crafted requests to the web application containing malicious serialized input.

MiniDVBLinux 5.4 Arbitrary File Read Vulnerability

The distribution suffers from an arbitrary file disclosure vulnerability. Using the 'file' GET parameter attackers can disclose arbitrary files on the affected device and disclose sensitive and system information.

MiniDVBLinux 5.4 Remote Root Command Execution Vulnerability

The application suffers from an OS command execution vulnerability. This can be exploited to execute arbitrary commands as root, through the 'command' GET parameter in /tpl/commands.sh.

MiniDVBLinux 5.4 Remote Root Command Injection Vulnerability

The application suffers from an OS command injection vulnerability. This can be exploited to execute arbitrary commands with root privileges.

MiniDVBLinux 5.4 Unauthenticated Stream Disclosure Vulnerability

The application suffers from an unauthenticated live stream disclosure when /tpl/tv_action.sh is called and generates a snapshot in /var/www/images/tv.jpg through the Simple VDR Protocol (SVDRP).

MiniDVBLinux 5.4 Change Root Password PoC

The application allows a remote attacker to change the root password of the system without authentication (disabled by default) and verification of previously assigned credential. Command execution also possible using several POST parameters.