what you don't know can hurt you

SeaWell Networks Spectrum SDC 02.05.00 Traversal / Privilege Escalation

SeaWell Networks Spectrum SDC 02.05.00 Traversal / Privilege Escalation
Posted Jan 18, 2016
Authored by Karn Ganeshen

SeaWell Networks Spectrum SDC version 02.05.00 suffers from weak default credentials, path traversal, and privilege escalation vulnerabilities.

tags | exploit, vulnerability, file inclusion
advisories | CVE-2015-8282, CVE-2015-8283, CVE-2015-8284
MD5 | 63bc15aeb66b5d194085b1e3d8c1ed69

SeaWell Networks Spectrum SDC 02.05.00 Traversal / Privilege Escalation

Change Mirror Download
# Exploit Title: [SeaWell Networks Spectrum - Multiple Vulnerabilities]
# Discovered by: Karn Ganeshen
# Vendor Homepage: [http://www.seawellnetworks.com/spectrum/]
# Versions Reported: [Spectrum SDC 02.05.00, Build]


About SeaWell Networks Spectrum

Session Delivery Control

SeaWell set out to improve the way operators control, monetize and scale their IP video offerings, to meet the growing subscriber demands for video delivered to smartphones, tablets and game consoles.

The result – Spectrum – is what we call a “Multiscreen 2.0” Session Delivery Controller.

Spectrum is high-performance, carrier-grade software that takes ABR video and repackages it – on-the-fly – into any other protocol, including Apple HLS, Adobe HDS, Microsoft Smooth Streaming and MPEG-DASH.


Affected version
Spectrum SDC 02.05.00
Copyright (c) 2015 SeaWell Networks Inc.

A. CWE-255: Credentials Management

Weak, default login credentials - admin / admin

B. CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The configure_manage.php module accepts a file parameter which takes an unrestricted file path as input, allowing an attacker (non-admin, low- privileged user) to read arbitrary files on the system.



C. CWE-285: Improper Authorization

A low privileged, non-admin user, with only viewer privileges, can perform administrative functions, such as create, update, delete a user (including admin user), or access device's configuration files (policy.xml, cookie_config.xml, systemCfg.xml). The application lacks Authorization controls to restrict any non-admin users from performing admin functions.

The application users can have admin or viewer privilege levels. Admin has full access to the device. Viewer has access to very restricted functions.

It is possible for a viewer priv user to perform admin functions.


Add new user [Admin function only]

GET /system_manage.php?username=viewer&password=viewer&password=viewer&userlevel=1&action=add_user&ekey=&LActiveRow= HTTP/1.1



admin -> userlevel=9
viewer -> userlevel=1

Create new user with Admin privs
Log in as viewer - try create new admin user - viewer1



Delete user


Modify existing user (including admin)
log in as viewer - try change system (admin) user



Change Admin password
log in as viewer - try change admin pass



Downloading configuration xml files

viewer priv user has no access/option to config xmls via GUI. It is possible to download the configs by calling the url directly

Access policy config xml

Access cookie config xml

Access system config xml

Best Regards,
Karn Ganeshen


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    4 Files
  • 13
    Oct 13th
    4 Files
  • 14
    Oct 14th
    15 Files
  • 15
    Oct 15th
    19 Files
  • 16
    Oct 16th
    25 Files
  • 17
    Oct 17th
    17 Files
  • 18
    Oct 18th
    7 Files
  • 19
    Oct 19th
    1 Files
  • 20
    Oct 20th
    3 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    11 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By