aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml19
1 files changed, 10 insertions, 9 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 5634b054fc10..8e30d138414e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -63,6 +63,7 @@ Notes:
<affects>
<package>
<name>plexmediaserver</name>
+ <name>plexmediaserver-plexpass</name>
<range><lt>1.13.5.5332</lt></range>
</package>
</affects>
@@ -71,17 +72,17 @@ Notes:
<p>Chris reports:</p>
<blockquote cite="https://seclists.org/fulldisclosure/2018/Aug/1">
<p>The XML parsing engine for Plex Media Server's SSDP/UPNP
- functionality is vulnerable to an XML External Entity
+ functionality is vulnerable to an XML External Entity
Processing (XXE) attack. Unauthenticated attackers on the same LAN can
use this vulnerability to:</p>
- <li>
- <ul>Access arbitrary files from the filesystem with the same permission as
- the user account running Plex.</ul>
- <ul>Initiate SMB connections to capture NetNTLM challenge/response and
- crack to clear-text password.</ul>
- <ul>Initiate SMB connections to relay NetNTLM challenge/response and
- achieve Remote Command Execution in Windows domains.</ul>
- </li>
+ <ul>
+ <li>Access arbitrary files from the filesystem with the same permission as
+ the user account running Plex.</li>
+ <li>Initiate SMB connections to capture NetNTLM challenge/response and
+ crack to clear-text password.</li>
+ <li>Initiate SMB connections to relay NetNTLM challenge/response and
+ achieve Remote Command Execution in Windows domains.</li>
+ </ul>
</blockquote>
</body>
</description>