← Advisories

STVS ProVision 5.9.10 Cross-Site Request Forgery (Add Admin)

Medium
Advisory ID
ZSL-2021-5625
Release Date
26 January 2021
Vendor
Affected Version
5.9.10 (build 2885-3a8219a), 5.9.9 (build 2882-7c3b787), 5.9.7 (build 2871-a450938), 5.9.1 (build 2771-1bbed11), 5.9.0 (build 2701-6123026), 5.8.6 (build 2557-84726f7), 5.7, 5.6, 5.5
CVE
N/A
Tested On
Ubuntu 14.04.3, nginx/1.12.1, nginx/1.4.6, nginx/1.1.19, nginx/0.7.65, nginx/0.3.61
Summary

STVS is a Swiss company specializing in development of software for digital video recording for surveillance cameras as well as the establishment of powerful and user-friendly IP video surveillance networks.

Description

The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

Proof of Concept
Disclosure Timeline
19.01.2021Vulnerability discovered.
19.01.2021Vendor contacted.
25.01.2021No response from the vendor.
26.01.2021Public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
26.01.2021Initial release
31.01.2021Added reference [1], [2], [3] and [4]