-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== Title: TwonkyMedia Server Multiple Cross-Site Scripting Vulnerabilities Product: TwonkyMedia Server Vendor: TwonkyMedia (PacketVideo Corporation), http://www.twonkymedia.com Author: Davide Canali E-mail: davide (at) davidecanali (dot) com Date: 2009-10-21 =========================================================================== 1. BACKGROUND: TwonkyMedia Server is a DLNA-compliant, UPnP AV-compliant software that allows to share and stream media to hundreds of popular consumer electronics devices. It is available for Windows, Linux, Macintosh and for various different architectures. TwonkyMedia Server is bundled on a variety of CE and NAS devices from leading manufacturers, including: Buffalo LinkStation, HP Media Vault, LaCie Ethernet Disk, Philips Streamium music players, Western Digital Share Space. 2. DESCRIPTION: TwonkyMedia Server contains multiple Cross-Site Scripting (XSS) vulnerabilities. The TwonkyMedia web server fails to adequately sanitize user input (HTTP request strings and form input); thus, an attacker may be able to execute arbitrary script code in a victim's browser. 3. DETAILS Two main vulnerabilities have been found. The TwonkyMedia server IP address, in the following, is just denoted as "twonky". 1st VULNERABILITY: ================== A HTTP GET request at http://twonky:9000/NON-EXISTENT-PAGE results in a 404 error page containing: