Video Cam Server version 1.0.0 is susceptible to a directory traversal attack.
ada3a5328ddaa14bdc136ad11e095dc6ab58a6c24f3b0f31394aa705cb84dc7d
Donato Ferrante
Application: Video Cam Server
https://vcs.raybase.com/
Version: 1.0.0
Bugs: Multiple Vulnerabilities
Date: 02-May-2005
Author: Donato Ferrante
e-mail: fdonato@autistici.org
web: www.autistici.org/fdonato
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
1. Description
2. The bugs
3. The code
4. The fix
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
----------------
1. Description:
----------------
Vendor's Description:
"Video Cam Server (VCS) is a server for publishing the image taken from
a Video Camera (especially Web Cam) connected to it. It will be very
useful for remote monitoring your home, office or other environment."
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
-------------
2. The bugs:
-------------
The bugs are located into the built-in webserver.
By default no HTTP Authentication is set so a malicious user can:
i.
(path disclosure) know the remote current path, by sending an
http request for an unavailable page.
ii.
(directory traversal) go out the document root assigned to the
webserver by using common malicious patterns like: ".." into
http requests, and see/download all the files available on the
remote system.
iii.
(denial of service) shutdown http-server and/or camera, by using
admin's control page that it's not properly managed.
NOTE:
Reported vulnerabilities are also valid if the HTTP Authentication is
set, but in this case the malicious user must obtain login information.
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
-------------
3. The code:
-------------
To test the vulnerabilities:
i.
https://[host]/%20
ii.
https://[host]/..\..\..\..\..\..\..\..\..\..\..\windows\system.ini
or connect to the webserver and send a raw request like:
GET /../../../../../../../../../../../windows/system.ini HTTP/1.1
iii.
https://[host]/admin.html
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
------------
4. The fix:
------------
Vendor has been notified.
Bugs will be probably fixed in the next release.
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx