Document Title:
===============
byRemote Surveillance v2.0 - Multiple Vulnerabilities
Date:
=====
2011-08-07
VL-ID:
=====
226
Introduction:
=============
The byRemote Surveillance Center (BSC) is a web-based camera management and recording software developed by byRemote, Inc.
Our vision in designing the BSC was to build a solution that was user-friendly, easy to navigate and simple to access at any time.
The BSC does not require client-side software to be installed on your PC. All you need is a web-browser and an Internet connection.
Our open platform architecture gives our customers the ability to install the byRemote Surveillance Center on Linux or Windows.
100% web-enabled software running Apache Tomcat and Java means no expensive OS server license is required.
Being an Axis Developer Partner, the BSC is designed around the Axis Communications network cameras. As the industry leader in IP-based
cameras, Axis Communications was the best choice for our solutions. We wanted to ensure our clients that byRemote worked with future-proof
technology that can be easily implemented as well as scalable and expandable.
(Copy of the Vendor Homepage: http://www.byremote.net/services/)
Abstract:
=========
Vulnerability-Lab Team discovered multiple vulnerabilities on byRemote Surveillance Center.
Report-Timeline:
================
2011-08-08: Public or Non-Public Disclosure
Status:
========
Published
Affected Products:
==================
Exploitation-Technique:
=======================
Remote
Severity:
=========
Critical
Details:
========
1.1
Multiple SQL Vulnerabilities are detected on RSC. An attacker is able to inject own sql statements over a not secure parameter.
Vulnerable Module(s):
[+] Listing - Sort & ID
Pictures:
../sql1.png
../sql2.png
1.2
A Redirection Vulnerability is detected on client-side of the application. The redirection bug allows an remote attacker to
redirect users with user inter action to external malicious/phishing websites.
[+] Devices
1.3
A persistent Input Validation Vulnerability is detected on the edit camera group module of the application.
Remote attackers or local low privileged user accounts can implement persistent malicious script codes to manipulate
specific application content/modules. The bug allows also to hijack the customer sessions with low required user inter action.
[+] Edit Camera Group - Group Information
Proof of Concept:
=================
The vulnerabilities can be exploited by local low privileged user accounts & remote attackers.
For demonstration or reproduce ...
1.1
http://video.xxx.com/events.jsp?sort=totalsize&sortdir=[SQL-Injection]
http://video.xxx.com/devicegroups.jsp?sort=groupname&startpos=1&showtab=true&sortdir=[SQL-Injection]
or stable ... http://video.xxx.com/error.jsp?rand=0.7014096737219707
1.3
Code Review: Edit Camera Group - Group Information (IVE/Persistent)
Group Name
Actions | |