Vulnerability & Exploit Database

Back to search

Serviio Media Server checkStreamUrl Command Execution

This module exploits an unauthenticated remote command execution vulnerability in the console component of Serviio Media Server versions 1.4 to 1.8 on Windows operating systems. The console service (on port 23423 by default) exposes a REST API which which does not require authentication. The 'action' API endpoint does not sufficiently sanitize user-supplied data in the 'VIDEO' parameter of the 'checkStreamUrl' method. This parameter is used in a call to cmd.exe resulting in execution of arbitrary commands. This module has been tested successfully on Serviio Media Server versions 1.4.0, 1.5.0, 1.6.0 and 1.8.0 on Windows 7.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/windows/http/serviio_checkstreamurl_cmd_exec

Authors

  • Gjoko Krstic(LiquidWorm) <gjoko [at] zeroscience.mk>
  • Brendan Coles <bcoles [at] gmail.com>

References

Targets

  • Automatic Targeting

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/http/serviio_checkstreamurl_cmd_exec msf exploit(serviio_checkstreamurl_cmd_exec) > show targets ...targets... msf exploit(serviio_checkstreamurl_cmd_exec) > set TARGET <target-id> msf exploit(serviio_checkstreamurl_cmd_exec) > show options ...show and set options... msf exploit(serviio_checkstreamurl_cmd_exec) > exploit