A remote authenticated authorization-bypass vulnerability in Wowza Streaming Engine 4.8.0 and earlier allows any read-only user to issue requests to the administration panel in order to change functionality. For example, a read-only user may activate the Java JMX port in unauthenticated mode and execute OS commands under root privileges. This issue was resolved in Wowza Streaming Engine 4.8.5.
References
Link | Resource |
---|---|
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-9004-Authenticated%20Remote%20Authorization%20Bypass%20Leading%20to%20RCE-Wowza | Exploit Third Party Advisory |
https://raw.githubusercontent.com/WowzaMediaSystems/public_cve/main/wowza-streaming-engine/CVE-2020-9004.txt | Third Party Advisory |
https://www.wowza.com/docs/wowza-streaming-engine-4-8-5-release-notes | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-04-14T14:50:52
Updated: 2020-09-29T20:55:24
Reserved: 2020-02-16T00:00:00
Link: CVE-2020-9004
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-04-14T15:15:13.353
Modified: 2022-05-03T14:06:14.813
Link: CVE-2020-9004
JSON object: View
Redhat Information
No data.
CWE