Exploit the possiblities

e2openplugin OpenWebif 1.2.4 Code Execution

e2openplugin OpenWebif 1.2.4 Code Execution
Posted Oct 3, 2017
Authored by John Torakis

e2openplugin OpenWebif versions 0.2.9 through 1.2.4 suffer from a code execution vulnerability.

tags | exploit, code execution
advisories | CVE-2017-9807
MD5 | e3b736333b9d373249b51af3bd173ccf

e2openplugin OpenWebif 1.2.4 Code Execution

Change Mirror Download
Hello all,

e2openplugin-OpenWebif is an open source web interface plugin for IP TVs
and media centers. It is found in several IP TV software images and
hardware products including the commercial Dreambox devices.


A remote code injection vulnerability was found in the "key" HTTP GET
parameter of the "/api/saveconfig" API call.

Further analysis of the vulnerability can be found here:
https://census-labs.com/news/2017/10/02/e2openplugin-openwebif-saveconfig-remote-code-execution/

The vulnerability allows remote code execution on hosts running the
aforementioned plugin. Some devices affected also run the plugin under
root privileges (e.g: Dreambox DM800 HD se), allowing for complete
remote takeover of the host.

This defect has been patched by the vendor with the git commit:
09a050c8f04afd3bb4a14af98994be255aae10d9
(https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/commit/09a050c8f04afd3bb4a14af98994be255aae10d9).

Administrators of affected devices are strongly advised to update their
running instance of e2openplugin-OpenWebif to the latest version of the
code. An official release containing the fix has not been released yet.


References:
https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9807
https://census-labs.com/news/2017/10/02/e2openplugin-openwebif-saveconfig-remote-code-execution/

Disclosure Timeline:
Vendor Contact: June 21st, 2017
CVE assignment: June 22nd, 2017
Vendor Patch: September 15th, 2017
Public Advisory: October 2nd, 2017


Regards,
--
John Torakis

Security Researcher
CENSUS S.A.



Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    0 Files
  • 17
    Jan 17th
    0 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close