标题 简介 类型 公开时间
关联规则 关联知识 关联工具 关联文档 关联抓包
参考1(官网)
参考2
参考3
详情
[SAFE-ID: JIWO-2024-746]   作者: ecawen 发表于: [2017-09-28]

本文共 [467] 位读者顶过

FLIR系统是具有高性能入侵检测的车载分析系统,Beyond Security的安全研究人员发现FLIR的热敏摄像机系列 FC-Series S, FC-Series ID, PT-Series存在的一些漏洞,可使信息泄露、远程代码执行以及硬编码的凭据等。

[出自:jiwo.org]

Vulnerabilities Summary
The following advisory describes 5 (five) vulnerabilities found in FLIR Systems FLIR Thermal/Infrared Camera FC-Series S, FC-Series ID, PT-Series.

FLIR – “Best-in-class thermal cameras with on-board analytics for high-performance intrusion detection. The new FC-Series ID combines best-in-class thermal image detail and high-performance edge perimeter analytics together in a single device that delivers optimal intrusion detection in challenging environments and extreme conditions”.

The vulnerabilities found are:

  • Information disclosure
  • Stream disclosure
  • Unauthenticated Remote Code Execution
  • Authenticated Remote Code Execution
  • Hard-coded Credentials

Credit
An independent security researcher, Gjoko Krstic – Zero Science Lab, has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program.

Vendor Response
The vendor has been notified on the 27th of June 2017, several emails were exchanged, but no ETA for a fix or workaround have been provided for the following vulnerabilities.

Vulnerabilities details

Information Disclosure (1)
The FLIR web-server webroot/js/fns.login.js provides API functionality. By using the following API calls an attacker can download and read files from the FLIR OS:

  • /api/xml?file=PATH-TO-FILE
  • /api/file/download/PATH-TO-FILE
  • /api/file/content/PATH-TO-FILE
  • /api/server/videosnap?file=PATH-TO-FILE
  • /page/maintenance/view/server-lan
  • /api/file/ini/read
  • /api/system/config/product

Proof of Concept

Stream Disclosure
FLIR web-server does not validate if the user is authenticated when asked to show the live feed.

Proof of Concept
An attacker can get the live stream by sending sending the the following request:

Unauthenticated Remote Code Execution
User controlled input is not sufficiently sanitized and can be exploit by an attacker to execute command on the machine.

By sending GET request to /maintenance/controllerFlirSystem.php an attacker can trigger the vulnerability.

Proof of Concept

Authenticated Remote Code Execution
User controlled input is not sufficiently sanitized and can be exploit by an attacker to execute command on the machine.

By sending POST request to //page/maintenance/lanSettings/dns an attacker can trigger the vulnerability.

Proof of Concept

Hard-coded Credentials

评论

暂无
发表评论
 返回顶部 
热度(467)
 关注微信