Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <949efc4e-dc03-c261-2eda-f554eb3ed0fe@enst-bretagne.fr>
Date: Thu, 3 Mar 2022 21:56:42 +0100
From: Gabriel Corona <gabriel.corona@...t-bretagne.fr>
To: oss-security@...ts.openwall.com
Subject: DNS rebinding on ReadyMedia/minidlna v1.3.0 and below

ReadyMedia [1] (formerly MiniDLNA) v1.3.0 and below is vulnerable to DNS 
rebinding attacks. A malicious remote web server may trick the user 
browser into triggering arbitrary UPnP requests on the local DLNA server 
and observe the result of these actions. Moreover, the shared files are 
accessible through DNS rebinding as well.

A remote malicious server could exploit the user browser in order to:

* list the available media files and exfiltrate this list;
* download the media files and exfiltrate them.

This has been fixed in ReadyMedia v1.3.1.

[1] https://sourceforge.net/projects/minidlna/

-- 
Gabriel

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.