Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-35492 PoC — Wowza Media Systems Wowza Streaming Engine 资源管理错误漏洞

Source
Associated Vulnerability
Title:Wowza Media Systems Wowza Streaming Engine 资源管理错误漏洞 (CVE-2021-35492)
Description:Wowza Media Systems Wowza Streaming Engine是美国Wowza Media Systems公司的一个强大的、可定制的和可扩展的媒体服务器软件。用于将高质量视频和音频可靠地流式传输到任何地方的任何设备。 Wowza Media Systems Wowza Streaming Engine 4.8.11+5 版本及之前版本存在安全漏洞,攻击者可利用该漏洞造成数据库错误,并使设备对基于web的管理失去响应。
Description
Denial of Service tool for Wowza Streaming Engine <= 4.8.11+5 - Uncontrolled Resource Consumption (CVE-2021-35492)
Readme
## Exploit Information

**Exploit Title:** Wowza Streaming Engine 4.8.11+5 - Denial of Service  
**CVE:** [CVE-2021-35492](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35492)  
**Date:** 2021-10-06  
**Exploit Author:** N4nj0  
**Software Link:** [https://www.wowza.com/products/streaming-engine](https://www.wowza.com/products/streaming-engine)  
**Version:** 4.8.11+5  
**Tested on:** Wowza Streaming Engine <= 4.8.11+5  
**Vulnerability Advisory:** [https://n4nj0.github.io/advisories/wowza-streaming-engine-i/](https://n4nj0.github.io/advisories/wowza-streaming-engine-i/)  

TWowza Streaming Engine (known as Wowza Media Server) is a unified streaming media server software developed by Wowza Media Systems based in Colorado, in the United States of America and used by many US government entities such as NASA, US Air force, Boeing, New York Police Department and many other clients around the world.  
I've found a uncontrolled resource consumption which enables a remote attacker to exhaust filesystem resources via the */enginemanager/server/vhost/historical.jsdata* `vhost` parameter. A successful exploit could allow the attacker to cause database errors and cause the device to become unresponsive to web-based management.

### Usage
`./dos-exploit-wse.py -u http://wse.local:8088 -s CDA32846E8763F62293AAE42FA72C86B`  
`./dos-exploit-wse.py --url http://wse.local:8088 --session CDA32846E8763F62293AAE42FA72C86B`  
File Snapshot

[4.0K] /data/pocs/6929d5f7079abed411c80bec28a6fbe73b070df8 ├── [3.6K] dos-exploit-wse.py ├── [1.0K] LICENSE.md └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.