#VU9433 Use of hard-coded credentials in Kaltura - CVE-2017-14143
Published: November 28, 2017 / Updated: November 28, 2017
Vulnerability identifier: #VU9433
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2017-14143
CWE-ID: CWE-798
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
Kaltura
Kaltura
Software vendor:
Kaltura Inc.
Kaltura Inc.
Description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to usage of hard-coded secret in "
/server/plugins/admin_console/kaltura_internal_tools/admin/KalturaInternalToolsSystemHelperAction.php files. A remote unauthenticated attacker can set the "
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable server.
The vulnerability exists due to usage of hard-coded secret in "
userzone" cookie in the getUserzoneCookie() function in "/lib/kalturaAction.class.php" file and deserialization of untrusted data in /modules/system/actions/helperAction.class.php and /server/plugins/admin_console/kaltura_internal_tools/admin/KalturaInternalToolsSystemHelperAction.php files. A remote unauthenticated attacker can set the "
userzone" cookie into "y3tAno3therS$cr3T" value and execute arbitrary PHP code on the target system with privileges of the current web server. Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable server.
Remediation
Update to version 13.2.0.