Vulnerability identifier: #VU17341
Vulnerability risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
coTURN
Server applications /
Other server solutions
Vendor: coTURN
Description
The vulnerability allows a remote authenticated attacker to gain access to potentially sensitive information.
The vulnerability exists in the coturn Traversal Using Relay NAT (TURN) server functionality due to an unsafe default configuration that allows the affected software to enable loopback forwarding to relay external traffic to the loopback interface. A remote attacker can set up a relay with a loopback address as the peer on a targeted TURN server that is designed to forward traffic from an external interface to the server loopback to gain unauthorized access to other sensitive services running on the loopback interface.
Mitigation
Update to version 4.5.1.0.
Vulnerable software versions
coTURN: 4.0.0.0 - 4.5.0.8
External links
http://github.com/coturn/coturn/blob/4.5.1.0/ChangeLog
http://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0732
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.