<<< Date Index >>>     <<< Thread Index >>>

Digital Armaments Security Advisory 10.07.2006: Flexwath Authorization Bypassing and XSS Vulnerability



Digital Armaments advisory is 04.15.2006
http://www.digitalarmaments.com/2006300687985463.html

I. Background

FlexWATCH is a stand-alone network camera server with built-in CMOS camera and 
web server which deliver crisp real time live videos at a rate up to 30fps over 
the network. It is normally used as security camera.
For further information or detail about the software you can refer to the 
vendor's homepage:

http://www.flexwatch.com/


II. Problem Description

Flexwatch Network Cameras are vulnerable to two security flaws, allowing a 
cross site scripting and bypassing the protected areas. Here detailed:

- Cross-site scripting:

An attacker can cause a Cross-site-scripting:
http://camera/%3Cscript%3Ealert('www.eazel.es')%3C/script%3E

- Authorization Bypassing:

An attacker can bypass the protection of protected pages using /..%2f and 
access to administrative area:
Network Camera V3.0: http://camera/..%2fadmin/aindex.asp
Networks Camera Prior versions: http://camera/app/..%2fadmin/aindex.htm


III. Detection

This problem has been detected on latest and older version of Flexwatch Network 
Cameras.
Network Camera Versions tested on:
- ver 3.0 for FW-3400-A(PAL)
- ver 2.0 (PAL)
- ver 2.3 (NTSC)


IV. Impact analysis

Successful exploitation allow an attacker to bypass authorization and access 
the image/video of the security camera. Cross site attacks are also possible.


V. Solution

First notification 04.16.2006.
Second notification 04.22.2006.
No answer from the vendor.


VI. Credit

Jaime Blasco - jaime.blasco@xxxxxxxx is credited with this discovery.

Get paid and get stocks by vulnerability submission
http://www.digitalarmaments.com/contribute.html

VII. Legal Notices

Copyright © 2006 Digital Armaments LLC.

Redistribution of this alert electronically is allowed. It should not be edited 
in any way. Reprint the whole is allowed, partial reprint is not permitted. For 
any other request please email customerservice@xxxxxxxxxxxxxxxxxxxx for 
permission.

Disclaimer: The information in the advisory is believed to be accurate at the 
time of publishing based on currently available information. Use of the 
information constitutes acceptance for use in an AS IS condition. There are no 
warranties with regard to this information. Neither the author nor the 
publisher accepts any liability for any direct, indirect, or consequential loss 
or damage arising from use of, or reliance on, this information.