A remote authenticated authorization-bypass vulnerability in Wowza Streaming Engine 4.8.0 and earlier allows any read-only user to issue requests to the administration panel in order to change functionality. For example, a read-only user may activate the Java JMX port in unauthenticated mode and execute OS commands under root privileges. This issue was resolved in Wowza Streaming Engine 4.8.5.
References
Link | Resource |
---|---|
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-9004-Authenticated%20Remote%20Authorization%20Bypass%20Leading%20to%20RCE-Wowza | Exploit Third Party Advisory |
https://www.wowza.com/docs/wowza-streaming-engine-4-8-5-release-notes | Release Notes Vendor Advisory |
https://raw.githubusercontent.com/WowzaMediaSystems/public_cve/main/wowza-streaming-engine/CVE-2020-9004.txt | Third Party Advisory |
Configurations
Information
Published : 2020-04-14 08:15
Updated : 2022-05-03 07:06
NVD link : CVE-2020-9004
Mitre link : CVE-2020-9004
JSON object : View
CWE
CWE-306
Missing Authentication for Critical Function
Products Affected
wowza
- streaming_engine