exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ADH-Web IP Camera Access Bypass

ADH-Web IP Camera Access Bypass
Posted Sep 21, 2015
Authored by OrwellLabs

ADH-Web IP Cameras suffer from improper access restrictions and various other vulnerabilities.

tags | exploit, web, vulnerability, bypass
SHA-256 | f27d5f8c91ba3407b2bb5fd671d93c6be791bedca6d727599be3ad493389bd28

ADH-Web IP Camera Access Bypass

Change Mirror Download
1. *Advisory Information*

Title: ADH-Web Server IP-Cameras Improper Access Restrictions
Date published: 2015-09-19
Date of last update: 2015-09-19
Vendors contacted: ADH-Web
Author: Glaysson dos Santos
Release mode: User release

2. *Vulnerability Information*

Class: Information Exposure [CWE-200]
Impact: Security bypass
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name:

3. *Vulnerabilities*

3.1 ADH-Web Server IP-Cameras Improper Access Restrictions

3.1.1 Description

Due to improper access restriction the ADH-Web (item 4) device [1] allows a
remote attacker to browse and access arbitrary files from the following
directorie '/hdd0/logs'. you can also get numerous information
(important for a fingerprint step) via the parameter "variable" in
variable.cgi script.

3.1.2 Vulnerability Details

Usually this directory can be protected against
unauthenticated access (401 Unauthorized), though, it can access all files
directly without requiring authentication.As in the statement below:

[401]
. 'http://<target_ip>/hdd0/logs'
[200]
. 'http://<target_ip>/hdd0/logs/log.txt'

Most common logfiles:

. 'bak.txt
. 'connect.txt'
. 'log.txt'
. 'seclog.log'
. 'startup.txt'
. 'DBGLOG.TXT'
. 'access.txt'
. 'security.txt'

3.1.3 Impact

This could allow a remote attacker to obtain valuable information such as
access credentials, Network configuration and other sensitive information
in plain text.

Another problem identified is an information exposure via the parameter
"variable" in variable.cgi script. Knowing some variables can extract a
reasonable amount of information. For exemplo:

* DNS
. 'http://target_ip/variable.cgi?variable=dhcp_dns&slaveip=0.0.0.0'

* ftp master ftp console credenthials ((the development team said that this
credential is not used, then why does it exist?):
. '
http://target_ip/variable.cgi?variable=console_master_ftpuser&slaveip=0.0.0.0
'
. '
http://target_ip/variable.cgi?variable=console_master_ftppass&slaveip=0.0.0.0
'

(although the vast majority of servers have ftp / telnet with anonymous
access allowed.)

* alarms
. 'http://target_ip/variable.cgi?variable=alarm_title&slaveip=0.0.0.0'
* camconfig
. 'http://target_ip/variable.cgi?variable=camconfig[0]&slaveip=127.0.0.1'
(includes, but is not limited to) There are a lot of variables [an audit
tool is on the way].

This servers also sends credentials (and other sensitive data) via GET
parameters
This is poor practice as the URL is liable to be logged in any number of
places
between the customer and the camera. The credentials should be passed in
the body
of a POST request (under SSL of course, here is not the case). .
(Is possible to create, edit and delete users and other configurations in
this way, dangerous)

4. *Vulnerable Products and Packages*

. The following products are affected:
- SD Advanced Closed IPTV
- SD Advanced
- EcoSense
- Digital Sprite 2
Other products/models are probably affected too, but they I not checked.

5. *Vendor Information, Solutions and Workarounds*

The vendor found that some things are not vulnerabilities (sensitive
information via GET, for example)
and others are useless (hardcoded credentials) and others are not yet so
critical (access to server logs).
I think that at least this information can assist during an intrusion test,
as will be shown soon.

6. *Credits*
This vulnerability was discovered by Glaysson dos Santos.

7. *Report Timeline*

. 2015-08-31:
Vendor has been notified about the vulnerabilities (without details yet).

. 2015-09-01:
Vendor acknowledges the receipt of the email and asks for technical
details.

. 2013-09-01:
A email with technical details is sent to vendor.

. 2013-09-11:
Still no response, another email was sent to the Vendor requesting any
opinion on the reported problems.

the following points were highlighted in this email:
* 1. No unauthenticated access [No web pages/URL parameters on the cameras
should be accessible without credentials.]
* 2. Credentials (and other sensitive data) via GET parameters
* 4. Use of hard-coded password
* 3. no SSL

. 2013-09-11:
The vendor reported that the matter was passed on to the team developed
and that it would contact me the following week (2015-09-14).

. 2013-09-14:
The development team responded by passing its consideration of the points
and
reported in accordance with this response the impact of these
vulnerabilities
is low and are no longer available unauthenticated using recent software
release (version 10212).

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close