CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Lifecycle Timeline
4Tags
Description
Serviio PRO 1.8 DLNA Media Streaming Server contains a DOM-based cross-site scripting vulnerability that allows attackers to execute arbitrary HTML and script code by injecting malicious payloads. Attackers can craft URLs with malicious input that is read from document.location and passed to document.write() in the mediabrowser component to execute code in a user's browser context.
Analysis
A DOM-based cross-site scripting (XSS) vulnerability exists in Serviio PRO's mediabrowser component that allows unauthenticated remote attackers to execute arbitrary JavaScript code in a user's browser context. The vulnerability affects multiple versions of Serviio PRO (1.6.1 through 1.8.0.0) and exploits unsafe handling of URL parameters passed from document.location to document.write(). Publicly available proof-of-concept exploits exist, making this a moderate-to-high priority vulnerability despite the CVSS 6.1 score.
Technical Context
This vulnerability is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation) and specifically manifests as a DOM-based XSS flaw. The affected product is Serviio PRO (cpe:2.3:a:serviio:serviio_pro:*:*:*:*:*:*:*:*), a DLNA media streaming server that exposes a web-based mediabrowser component. The root cause is the unsafe use of document.write() in client-side JavaScript that directly incorporates unsanitized URL parameters read from document.location. Attackers craft malicious URLs containing JavaScript payloads that are reflected directly into the DOM without proper encoding or sanitization, allowing script execution within the authenticated user's browser context when they visit or are redirected to the crafted URL.
Affected Products
Serviio PRO versions affected per EUVD data: 1.6.1, 1.7.0, 1.7.1, and 1.8.0.0 PRO. The CPE indicates all versions of Serviio PRO (cpe:2.3:a:serviio:serviio_pro:*:*:*:*:*:*:*:*) are potentially in scope. The vulnerability is confirmed in the mediabrowser component. Serviio Free/Community editions are not explicitly mentioned in the provided data but may warrant investigation. The ENISA EUVD ID (EUVD-2017-18932) is the official European cataloging reference for this vulnerability.
Remediation
Patch availability: Upgrade Serviio PRO to version 1.9 or later (implied from version history; specific patch version not stated in provided references but post-1.8.0.0 versions should be investigated). Mitigation steps: (1) Immediately update Serviio PRO to the latest available version from the vendor; (2) Restrict network access to the Serviio web interface using firewall rules or network segmentation; (3) Disable remote access to the mediabrowser component if not required; (4) Monitor for suspicious URL parameters in access logs containing script-like payloads; (5) Implement Content Security Policy (CSP) headers if possible at the reverse proxy or application level. Vendor reference: https://www.vulncheck.com/advisories/serviio-pro-dom-based-cross-site-scripting-via-mediabrowser. Additional technical details: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5406.php and https://packetstormsecurity.com/files/142385 (POC).
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2017-18932