Description
Serviio PRO 1.8 contains an improper access control vulnerability in the Configuration REST API that allows unauthenticated attackers to change the mediabrowser login password. Attackers can send specially crafted requests to the REST API endpoints to modify credentials without authentication.
Problem types
Missing Authentication for Critical Function
Product status
1.7.1
1.7.0
1.6.1
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5407.php (Zero Science Lab Disclosure)
blogs.securiteam.com/index.php/archives/3094 (SecuriTeam Blogs)
www.exploit-db.com/exploits/41960/ (Exploit-DB)
packetstormsecurity.com/files/142386 (Packet Storm Security)
cxsecurity.com/issue/WLB-2017050025 (CXSecurity)
www.securitylab.ru/poc/486047.php (SecurityLab)
exchange.xforce.ibmcloud.com/vulnerabilities/125645 (IBM X-Force Exchange)
www.vulncheck.com/...henticated-password-change-via-rest-api (VulnCheck Advisory: Serviio PRO 1.8 Unauthenticated Password Change via REST API)