Friday, December 15, 2017

BrightSign - Multiple Vulnerablities - CVE-2017-17737, 17738, 17739

The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) suffers from multiple vulnerabilities.

The pages:

/network_diagnostics.html
/storage_info.html

Suffer from a Cross-Site Scripting vulnerability. The REF parameter for these pages do not sanitize user input, resulting in arbitrary execution, token theft and related attacks.



The RP parameter in STORAGE.HTML suffers from a directory traversal/information leakage weakness:
/storage.html?rp=%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2Fetc

Through parameter manipulation, the file system can be traversed, unauthenticated, allowing for leakage of information and compromise of the device.

This page also allows for unauthenticated upload of files.

/tools.html

Page allows for unauthenticated rename/manipulation of files.

When combined, these vulnerabilities allow for compromise of both end users and the device itself.

Ex. A malicious attacker can upload a malicious page of their choosing and steal credentials, host malicious content or distribute content through the device, which accepts large format SD cards.

3 comments:

  1. Proper security procedures are posted in detail on the BrightSign documentation website. http://docs.brightsign.biz/display/DOC/BrightSign+Player+Security
    These additional vulnerability issues have been resolved in 6.2.171 and newer.

    ReplyDelete
  2. Selecting a digital signage screen or system for your business includes several components such as software and hardware management, fees, types of screens, security, pricing, and flexibility of the contract. Choosing the right system will aid in how much the signage benefits the business.  digital signage software

    ReplyDelete
  3. Signage is always a useful thing. Because by this thing people find their place so easily. Life is getting very easier by this Signage Perth.

    ReplyDelete