DSUtility.dll in Pelco Digital Sentry Server before 7.19.67 has an arbitrary file write vulnerability. The AppendToTextFile method doesn't check if it's being called from the application or from a malicious user. The vulnerability is triggered when a remote attacker crafts an HTML page (e.g., with "OBJECT classid=" and "<SCRIPT language='vbscript'>") to overwrite arbitrary files.
The product does not properly verify that the source of data or communication is valid.
Link | Tags |
---|---|
https://support.pelco.com/s/article/What-is-the-Digital-Sentry-software-release-revision-history | release notes vendor advisory |
https://github.com/vitorespf/Advisories/blob/master/Pelco_Digital_Sentry_Server_AFW.txt | third party advisory exploit |