Posts Tagged ‘server’

Subsonic 6.1.1 Server Side Request Forgery

Remote attackers can abuse the Podcast feature of subsonic to launch Server Side Request Forgery attacks from the subsonic server if an authenticated user clicks a malicious link or visits an attacker controlled webpage. Source: Subsonic 6.1.1 Server Side Request Forgery


Serviio Media Server checkStreamUrl Command Execution

This Metasploit module exploits an unauthenticated remote command execution vulnerability in the console component of Serviio Media Server versions 1.4 to 1.8 on Windows operating systems. The console service (on port 23423 by default) exposes a REST API which which does not require authentication. The ‘action’ API endpoint does not sufficiently sanitize user-supplied data in […]