Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Critical Vulnerabilities Lead to Account Takeover in Major IPTV Streamer

Critical vulnerabilities have been found in the Ukrainian IPTV video streaming platform Ministra, which uses Infomir-manufactured set top boxes (STBs) to transmit streaming content from the platform to end users’ televisions. Infomir sells its products throughout the world, so impacted users are not confined to the Ukraine.

Critical vulnerabilities have been found in the Ukrainian IPTV video streaming platform Ministra, which uses Infomir-manufactured set top boxes (STBs) to transmit streaming content from the platform to end users’ televisions. Infomir sells its products throughout the world, so impacted users are not confined to the Ukraine.

Check Point Research discovered the flaws over a year ago. Although the researchers reported the issues to the manufacturer, who patched the flaws, there is a likelihood that not all resellers have patched their individual service and remain at risk. Check Point has not been able to determine the numbers involved because, it reports, “we don’t know how many customers each of these resellers has, though from our initial scans there are over 1000 resellers around the world, so the number of those exposed could be very high.” There are, for example, 199 resellers in the U.S., 137 in the Netherlands and 117 in France alone.

Ministra is the Infomir platform that controls the STBs. It is PHP based, and requires that the distributors authenticate before gaining access to their control panel. Check Point noticed that some of the panel controllers included functions intended for Ajax use. The code said, if this is Ajax, and contains no authentication, refuse access. By not sending the relevant header that would indicate the presence of Ajax, the entire authentication check was simply by-passed. “As a result,” say the researchers, “we managed to elicit some unintended behavior.”

The researchers extended their investigation to other functions and found other weaknesses. They found they could control ‘order’, ‘like’ and ‘select’ keys inside the code of one function. Such keys are not usually fully sanitized because they are not directly supplied by the user; and it soon became apparent that certain functions were vulnerable to SQL Injection; which in turn could enable a PHP Object Injection (POI). “As we control keys in the query, we can perform either blind or reflected SQL injection,” write the researchers. In fact, since the function concerned is called from multiple locations in the code, the vulnerability could be triggered from other locations.

Looking further, they found a function vulnerable to the authentication bypass that also called the function vulnerable to the SQLi that could lead to the object injection. They had already got control of the ‘$this->…’ buffer; and discovered “we can control all the properties of this class: we can set `$this->_writer` to be false, and `$this->_path` to be any arbitrary path we want.”

In short, they could control the path and content of the file — they could write arbitrary files and get remote execution on the server. “Fun fact,” they add: “All the classes we used are related to SwiftMailer, so effectively, we found a generic file write gadget. You can now generate this gadget with PHPGGC (SwiftMailer/FW4).”

From a simple authentication by-pass, attackers could escalate through SQLi to an Object Injection. They would be able to execute arbitrary code on the server, impacting both the Ministra/Infomir reseller, and all the reseller’s customers. “The risks would be their entire customer database of personal info and financial details as well as allowing an attacker to potentially stream any content they choose on to the screens of their customer network,” warns Check Point.

Related: Check Point Acquires Web Application Security Startup ForceNock 

Advertisement. Scroll to continue reading.

Related: Check Point Acquires Dome9 for $175 Million 

Related: Check Point Partners With SCADAfence to Protect OT Networks 

Related: Magecart Hackers Now Targeting Vulnerable Magento Extensions 

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.