exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Nuevolabs Nuevoplayer For Clipshare SQL Injection

Nuevolabs Nuevoplayer For Clipshare SQL Injection
Posted Oct 29, 2014
Authored by Cory Marsh

Nuevolabs Nuevoplayer for Clipshare suffer from privilege escalation and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
advisories | CVE-2014-8339
SHA-256 | 6c44c70bde9d3e5c36c90b6ce3442b7c08e038b7b9f03afecb1fc03ded77a914

Nuevolabs Nuevoplayer For Clipshare SQL Injection

Change Mirror Download
Nuevolabs Nuevoplayer for clipshare SQL Injection
=======================================================================

:: ADVISORY SUMMARY ::
Title: Nuevolabs Nuevoplayer for clipshare Sql Injection
Vendor: NUEVOLABS (www.nuevolabs.com)
Product: NUEVOPLAYER for clipshare
Credits: Cory Marsh - protectlogic.com
Discovery: 2014-10-10
Release: 2014-10-28

Nueovplayer is a popular flash video player with integration into multiple popular video sharing suites. The most notable is Clipshare (clip-share.com). Nuevoplayer provides flash video playing capabilities to third party video sharing suites.


:: VULNERABILITY ::
Type: SQL Injection and Privilege Escalation
Category: Remote
Severity: High
CVSS2: 7.7
CVSS2: (AV:N/AC:L/Au:N/C:P/I:P/A:C/E:F/RL:TF/RC:C)
CVE-ID: CVE-2014-8339


:: AFFECTED PRODUCT VERSIONS ::
NUEVOLABS NUEVOPLAYER for clipshare version 8.0 and possibly earlier.

nuevolabs.com
clip-share.com


:: VULNERABILITY DETAILS ::
A sql injection vulnerability in nuevo player midroll feature with integration for clipshare allows remote attackers to read any information in the effected mysql database. Midrolls allow sites to insert ads or "midrolls" into videos during playback.

Because clipshare stores the administrator password in the database this leads to full comprise of the effected clipshare system.


:: SOLUTION ::
Vendor is not providing patches for effected customers.

If the site does NOT use midrolls, you can simply delete midroll.php to protect yourself. If you wish to patch the issue, you can apply this patch to midroll.php which wraps the $ch variable in a intval() function on line 29 of midroll.php:
line 29: 'channel = '.$ch.
becomes: 'channel = '.intval($ch).

------------------- CUT HERE -------------------
--- midroll.php 2014-10-16 21:02:36.077663202 -0600
+++ midroll-patched.php 2014-10-16 21:02:02.197662566 -0600
@@ -26,7 +26,7 @@

$chans = explode("|",$channel);
foreach($chans as $ch) {
- if(!$ch=='0') { $add.='channel = '.$ch.' OR '; }
+ if(!$ch=='0') { $add.='channel = '.intval($ch).' OR '; }
}
$add =trim($add); $add=trim($add,'OR');$add=trim($add);
------------------- CUT HERE -------------------

To apply the patch, copy paste this to a new file (midroll.patch for example), upload this file to your server and apply the patch with the command: patch /path/to/midroll.php < /path/to/midroll.patch
eg:
$ cp midroll.php /var/www/site/nuevo/midroll.patch
$ cd /var/www/site/nuevo
$ patch midroll.php < midroll.patch


:: DISCLOSURE ::

2014-10-15 initial vendor contact - no response
2014-10-21 CVE requested
2014-10-23 CVE assigned, vendor contact - no response
2014-10-24 posted to vendor forum - no respsone
2014-10-25 fourth vendor contact - no response
2014-10-26 vendor deletes post and suspends account
2014-10-29 public disclosure


:: DISCLAIMER ::

THE INFORMATION PRESENTED HEREIN ARE PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, ANY IMPLIED WARRANTIES AND MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OR WARRANTIES OF QUALITY OR COMPLETENESS. THE INFORMATION PRESENTED HERE IS A SERVICE TO THE SECURITY COMMUNITY AND THE PRODUCT VENDORS. ANY APPLICATION OR DISTRIBUTION OF THIS INFORMATION CONSTITUTES ACCEPTANCE ACCEPTANCE AS IS, AND AT THE USER'S OWN RISK.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close