Virtual Event Today: Supply Chain Security Summit - Join Event In-Progress

Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Critical Vulnerabilities Lead to Account Takeover in Major IPTV Streamer

Critical vulnerabilities have been found in the Ukrainian IPTV video streaming platform Ministra, which uses Infomir-manufactured set top boxes (STBs) to transmit streaming content from the platform to end users’ televisions. Infomir sells its products throughout the world, so impacted users are not confined to the Ukraine.

Critical vulnerabilities have been found in the Ukrainian IPTV video streaming platform Ministra, which uses Infomir-manufactured set top boxes (STBs) to transmit streaming content from the platform to end users’ televisions. Infomir sells its products throughout the world, so impacted users are not confined to the Ukraine.

Check Point Research discovered the flaws over a year ago. Although the researchers reported the issues to the manufacturer, who patched the flaws, there is a likelihood that not all resellers have patched their individual service and remain at risk. Check Point has not been able to determine the numbers involved because, it reports, “we don’t know how many customers each of these resellers has, though from our initial scans there are over 1000 resellers around the world, so the number of those exposed could be very high.” There are, for example, 199 resellers in the U.S., 137 in the Netherlands and 117 in France alone.

Ministra is the Infomir platform that controls the STBs. It is PHP based, and requires that the distributors authenticate before gaining access to their control panel. Check Point noticed that some of the panel controllers included functions intended for Ajax use. The code said, if this is Ajax, and contains no authentication, refuse access. By not sending the relevant header that would indicate the presence of Ajax, the entire authentication check was simply by-passed. “As a result,” say the researchers, “we managed to elicit some unintended behavior.”

The researchers extended their investigation to other functions and found other weaknesses. They found they could control ‘order’, ‘like’ and ‘select’ keys inside the code of one function. Such keys are not usually fully sanitized because they are not directly supplied by the user; and it soon became apparent that certain functions were vulnerable to SQL Injection; which in turn could enable a PHP Object Injection (POI). “As we control keys in the query, we can perform either blind or reflected SQL injection,” write the researchers. In fact, since the function concerned is called from multiple locations in the code, the vulnerability could be triggered from other locations.

Looking further, they found a function vulnerable to the authentication bypass that also called the function vulnerable to the SQLi that could lead to the object injection. They had already got control of the ‘$this->…’ buffer; and discovered “we can control all the properties of this class: we can set `$this->_writer` to be false, and `$this->_path` to be any arbitrary path we want.”

In short, they could control the path and content of the file — they could write arbitrary files and get remote execution on the server. “Fun fact,” they add: “All the classes we used are related to SwiftMailer, so effectively, we found a generic file write gadget. You can now generate this gadget with PHPGGC (SwiftMailer/FW4).”

From a simple authentication by-pass, attackers could escalate through SQLi to an Object Injection. They would be able to execute arbitrary code on the server, impacting both the Ministra/Infomir reseller, and all the reseller’s customers. “The risks would be their entire customer database of personal info and financial details as well as allowing an attacker to potentially stream any content they choose on to the screens of their customer network,” warns Check Point.

Related: Check Point Acquires Web Application Security Startup ForceNock 

Related: Check Point Acquires Dome9 for $175 Million 

Related: Check Point Partners With SCADAfence to Protect OT Networks 

Related: Magecart Hackers Now Targeting Vulnerable Magento Extensions 

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Vulnerabilities

Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...