Skip to content

Sony BRAVIA Digital Signage 1.7.8 System API Information Disclosure

ID: sony-bravia-disclosure

Severity: low

Author: geeknik

Tags: misconfig,sony,unauth,exposure

The application is vulnerable to sensitive information disclosure vulnerability. An unauthenticated attacker can visit several API endpoints and disclose information running on the device.

id: sony-bravia-disclosure
info:
name: Sony BRAVIA Digital Signage 1.7.8 System API Information Disclosure
author: geeknik
severity: low
description: |
The application is vulnerable to sensitive information disclosure vulnerability. An unauthenticated attacker can visit several API endpoints and disclose information running on the device.
reference:
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5610.php
- https://www.zeroscience.mk/codes/sonybravia_sysinfo.txt
metadata:
max-request: 1
tags: misconfig,sony,unauth,exposure
http:
- method: GET
path:
- '{{BaseURL}}/api/system'
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"contentsServer":'
- '"networkInterfaces":'
- '"serverTime":'
- '"hostIp":'
condition: and
- type: word
part: header
words:
- "text/plain"
- "application/json"
condition: or
- type: status
status:
- 200
# digest: 4a0a00473045022100d0007689849de9623d64bd85349218992570bccd722cec46ea222f87cba620b402206dc45ad03ed021c79b7e0a97735a3269810f8aa6d97ff3f6efa3c0f5b8053a5a:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/sony-bravia-disclosure.yaml"

View on Github