#VU17341 Information disclosure in coTURN


Published: 2019-02-01

Vulnerability identifier: #VU17341

Vulnerability risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-4058

CWE-ID: CWE-200

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
coTURN
Server applications / Other server solutions

Vendor: coTURN

Description

The vulnerability allows a remote authenticated attacker to gain access to potentially sensitive information.

The vulnerability exists in the coturn Traversal Using Relay NAT (TURN) server functionality due to an unsafe default configuration that allows the affected software to enable loopback forwarding to relay external traffic to the loopback interface. A remote attacker can set up a relay with a loopback address as the peer on a targeted TURN server that is designed to forward traffic from an external interface to the server loopback to gain unauthorized access to other sensitive services running on the loopback interface.

Mitigation
Update to version 4.5.1.0.

Vulnerable software versions

coTURN: 4.0.0.0 - 4.5.0.8


External links
http://github.com/coturn/coturn/blob/4.5.1.0/ChangeLog
http://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0732


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability