6.4
CVSSv2

CVE-2020-26262

Published: 13/01/2021 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.2 | Impact Score: 2.7 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

Coturn is free open source implementation of TURN and STUN Server. Coturn before version 4.5.2 by default does not allow peers to connect and relay packets to loopback addresses in the range of `127.x.x.x`. However, it was observed that when sending a `CONNECT` request with the `XOR-PEER-ADDRESS` value of `0.0.0.0`, a successful response was received and subsequently, `CONNECTIONBIND` also received a successful response. Coturn then is able to relay packets to the loopback interface. Additionally, when coturn is listening on IPv6, which is default, the loopback interface can also be reached by making use of either `[::1]` or `[::]` as the peer address. By using the address `0.0.0.0` as the peer address, a malicious user will be able to relay packets to the loopback interface, unless `--denied-peer-ip=0.0.0.0` (or similar) has been specified. Since the default configuration implies that loopback peers are not allowed, coturn administrators may choose to not set the `denied-peer-ip` setting. The issue patched in version 4.5.2. As a workaround the addresses in the address block `0.0.0.0/8`, `[::1]` and `[::]` should be denied by default unless `--allow-loopback-peers` has been specified.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

coturn project coturn

fedoraproject fedora 32

fedoraproject fedora 33

Vendor Advisories

A flaw was discovered in coturn, a TURN and STUN server for VoIP By default coturn does not allow peers on the loopback addresses (127xxx and ::1) A remote attacker can bypass the protection via a specially crafted request using a peer address of 0000 and trick coturn in relaying to the loopback interface If listening on IPv6 the loopback ...
A security issue was found in coturn before version 452 By default coturn does not allow peers to connect and relay packets to loopback addresses in the range of 127xxx However, it was observed that when sending a CONNECT request with the XOR-PEER-ADDRESS value of 0000, a successful response was received and subsequently, CONNECTIONBIND a ...

Exploits

Coturn version 451x suffers from a loopback access control bypass vulnerability ...