| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 3.3 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Plex Media Server 0.9.9.10. It has been classified as problematic. This vulnerability affects unknown code of the component App Listing Handler. Performing a manipulation results in missing encryption. The attack is possible to be carried out remotely. No exploit exists.
Details
A vulnerability was found in Plex Media Server 0.9.9.10. It has been classified as problematic. This affects an unknown code block of the component App Listing Handler. The manipulation with an unknown input leads to a missing encryption vulnerability. CWE is classifying the issue as CWE-311. The product does not encrypt sensitive or critical information before storage or transmission. This is going to have an impact on confidentiality.
The weakness was disclosed 02/06/2014 by Stefan Viehböck with SEC Consult Vulnerability Lab as SEC Consult Vulnerability Lab Security Advisory 20140411-0 as not defined advisory (Website). The advisory is shared at sec-consult.com. The exploitability is told to be difficult. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Neither technical details nor an exploit are publicly available. MITRE ATT&CK project uses the attack technique T1600 for this issue. The advisory points out:
The Plex App Store fetches App listings and App code via HTTP. This enables active attackers (MITM) to run code in the context of the Plex Media Server. The Plex "Remote" functionality uses HTTP as well. This enables passive attackers to gain access to the session token in order to access the Plex Media Server web interface.
The advisory illustrates:
No proof of concept needed. The Plex App store is located at: http://nine.plugins.plexapp.com
The advisory contains the following remark:
Vendor confirms that certificate has been revoked. No other fixes have been implemented.
The vulnerability is also documented in the databases at X-Force (92765), SecurityFocus (BID 66783†) and Secunia (SA57882†). The entries VDB-13138, VDB-13139 and VDB-13140 are pretty similar. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 3.7VulDB Meta Temp Score: 3.3
VulDB Base Score: 3.7
VulDB Temp Score: 3.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Missing encryptionCWE: CWE-311 / CWE-310
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
02/06/2014 🔍02/06/2014 🔍
02/09/2014 🔍
02/10/2014 🔍
04/25/2014 🔍
05/05/2014 🔍
08/09/2017 🔍
Sources
Advisory: SEC Consult Vulnerability Lab Security Advisory 20140411-0Researcher: Stefan Viehböck
Organization: SEC Consult Vulnerability Lab
Status: Not defined
GCVE (VulDB): GCVE-100-13137
X-Force: 92765 - Plex Media Server App listings unauthorized access, Medium Risk
SecurityFocus: 66783 - Plex Media Server Multiple Security Vulnerabilities
Secunia: 57882 - Plex Media Server Multiple Vulnerabilities, Less Critical
See also: 🔍
Entry
Created: 05/05/2014 10:20Updated: 08/09/2017 14:08
Changes: 05/05/2014 10:20 (48), 08/09/2017 14:08 (12)
Complete: 🔍
Cache ID: 216:9D8:103
No comments yet. Languages: en.
Please log in to comment.