← Advisories

Selea CarPlateServer (CPS) v4.0.1.6 Local Privilege Escalation

Medium
Advisory ID
ZSL-2021-5621
Release Date
21 January 2021
Vendor
Selea s.r.l. - https://www.selea.com
Affected Version
4.0.1.6(210120), 4.013(201105), 3.100(200225), 3.005(191206), 3.005(191112)
Tested On
Microsoft Windows 10 Enterprise, SeleaCPSHttpServer/1.1
Summary

Our CPS (Car Plate Server) software is an advanced solution that can be installed on computers and servers and used as an operations centre. It can create sophisticated traffic control and road safety systems connecting to stationary, mobile or vehicle-installed ANPR systems. CPS allows to send alert notifications directly to tablets or smartphones, it can receive and transfer data through safe encrypted protocols (HTTPS and FTPS). CPS is an open solution that offers full integration with main video surveillance software. Our CPS software connects to the national operations centre and provides law enforcement authorities with necessary tools to issue alerts. CPS is designed to guarantee cooperation among different law enforcement agencies. It allows to create a multi-user environment that manages different hierarchy levels and the related division of competences.

Description

The application suffers from an unquoted search path issue impacting the service 'Selea CarPlateServer' for Windows deployed as part of Selea CPS software application. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Proof of Concept
Disclosure Timeline
07.11.2020Vulnerability discovered.
09.11.2020Vendor contacted.
09.11.2020Vendor responds asking for explanation.
09.11.2020Asked vendor for security personnel and explained about security submissions and risk/impact.
10.11.2020Vendor responds asking for details.
11.11.2020Sent details to the vendor (high-level, asked for PGP).
14.11.2020Asked vendor for status update.
18.11.2020Vendor responds: We already reviewed and fixed most of the vulnerabilities you described in newer version of both camera firmware and the CarPlateServer software.
19.11.2020Replied to the vendor.
20.11.2020Vendor will get back to us.
06.12.2020Asked vendor for status update.
09.12.2020Vendor in final test phase for new releases. Estimated release date: End of year.
09.12.2020Replied to the vendor.
17.01.2021Asked vendor for status update.
20.01.2021No response from the vendor.
21.01.2021Public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
21.01.2021Initial release
26.01.2021Added reference [1], [2] and [3]
23.03.2026Added reference [4]