exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

pinnacleShow151.txt

pinnacleShow151.txt
Posted Sep 21, 2004
Authored by Marc Ruef | Site computec.ch

Pinnacle ShowCenter 1.51 is susceptible to a denial of service attack when sent a GET request that points to a non-existent skin.

tags | advisory, denial of service
SHA-256 | 6a080d6eece24294fe3cc7308971c400eef6bd1eda302eb234157353029917b3

pinnacleShow151.txt

Change Mirror Download
Dear ladies and gentlemen,

I am a proud user of the Pinnacle ShowCenter 1.51. When I was playing
around with the system, it seems I have found a denial of service attack
against the web interface.

First I did manually a HTTP GET request that selects a non-existent
skin: http://192.168.0.11:8000/ShowCenter/SettingsBase.php?Skin=ATK

Afterwards I was not able to use the web interface anymore. I always get
PHP warnings and fatal errors for every GET request I want to do (german
Windows XP used):

--- cut ---

Warning:
loaduserprofile(C:\Programme\Pinnacle\ShowCenter\DocPath/Skin/Term/Name.inc.php):
failed to open stream: No such file or directory in
C:\Programme\Pinnacle\ShowCenter\DocPath\Classes\User.inc.php on line 85

Fatal error: loaduserprofile(): Failed opening required
'C:\Programme\Pinnacle\ShowCenter\DocPath/Skin/Term/Name.inc.php'
(include_path='.;C:\Programme\Pinnacle\ShowCenter\DocPath') in
C:\Programme\Pinnacle\ShowCenter\DocPath\Classes\User.inc.php on line 85

--- cut ---

I was not able to fix this within a few minutes. Editing the user
profiles or using an old one was not sucessfull. It seems there has been
something overwritten the user is not easily able to undo.

The surprise was, that the Pinnacle device was able to get the data as
usual. I tought this has to do with the source IP address because the
Pinnacle device and my testing machine have not had the same IP address.
I changed these to see the difference but there was none. I also tought
the hidden user profile has something to do with the HTTP_USER_AGENT
variant sent by the web browser. I was not able to succeed with using
different web browsers.

An attacker (in the same segment as the Pinnacle ShowCenter web server
is) may be able to stop the server by sending a corrupt request as I
described before. I wrote as proof-of-concept an exploit plugin for
Attack Tool Kit (ATK), an open-source vulnerability scanner and
exploiting tool[1]. Plugin 219 is able to detect the Pinnacle ShowCenter
Server[2] and 220 is able to run the denial of service attack[3].

Pinnacle has been informed on 2004/09/14 with an email to
info@pinnaclesys.com but I haven't get any reply yet. I hope they fix
this vulnerability in an upcoming software release (e.g. a more careful
input validation and connection limitation in
C:\Programme\Pinnacle\Shared Files\Programs\StrmServer\StrmServer.ini).

A possible fix requires some manual hacking. Resetting the skin name by
using another HTTP GET request for an existing skin as like
http://192.168.0.11:8000/ShowCenter/SettingsBase.php?Skin=DefaultXL does
not work. Thus, check the path given in the warning. If this is
C:\Programme\Pinnacle\ShowCenter\DocPath/Skin/ATK/Name.inc.php you can
copy or rename another profile in the path ATK to provide the needed
files. After resetting an existent skin you can delete the temp skin
directory.

Regards,

Marc Ruef

[1] http://www.computec.ch/projekte/atk/
[2]
http://www.computec.ch/projekte/atk/plugins/pluginslist/Pinnacle%20ShowCenter%20BSE%20web%20server%20detection.plugin.html
[3]
http://www.computec.ch/projekte/atk/plugins/pluginslist/Pinnacle%20ShowCenter%20BSE%20web%20server%20skin%20denial%20of%20service.plugin.html

(Attention: Long links may be broken!)

--
Computer, Technik und Security http://www.computec.ch/
Meine private Webseite http://www.computec.ch/mruef/
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close