lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4960E420.8000807@secniche.org>
Date: Sun, 04 Jan 2009 22:00:24 +0530
From: Aditya K Sood <0kn0ck@...niche.org>
To: bugtraq@...urityfocus.com, submit@...w0rm.com,
	submit@...unia.com, vuln@...unia.com, bugs@...uritytracker.com,
	cve@...re.org, submissions@...ketstormsecurity.org,
	vuldb@...urityfocus.com
Subject: Google Chrome FTP PASV IP Malicious Port Scanning Vulnerability.

Advisory: Google Chrome FTP PASV IP Malicious Port Scanning Vulnerability.

Version Affected:
Google Chrome: 1.0.154.36

Description:
Google Chrome FTP Client is vulnerable to FTP PASV malicious port
scanning vulnerability. The username in the
FTP (ftp://username:password@...ain.com) can be manipulated by tampering
it with certain IP address with
specification of port as
(ftp://xxx.xxx.xxx.xxx-22:password@...ain.com).The Google Chrome FTP
client make
connection to the rogue FTP server which uses PASV commands to scan
network.Dynamic requests are issued to a
rogue FTP server which accepts connection with different usernames as
the IP address with specified ports to locate
the non existing object on the target domain.

Request 1 : ftp://xxx.xxx.xxx.xxx-21:password@...ain.com
Request 2 : ftp://xxx.xxx.xxx.xxx-22:password@...ain.com
Request 3 : ftp://xxx.xxx.xxx.xxx-23:password@...ain.com
Request 4 : ftp://xxx.xxx.xxx.xxx-25:password@...ain.com

JavaScript Port Scanning is used to exploit this issue. A malicious web
page hosted on a specially-coded FTP server
could use this feature to perform a generic port-scan of machines inside
the firewall of the victim.The generated
fraudulent request helps attacker to exhibit internal network
information through sustainable port scanning through
JavaScript.

Proof of Concept:
http://www.secniche.org/gcfpv

Links:
http://secniche.org/gcfps.html
http://evilfingers.com/advisory/index.php

Detection:
SecNiche confirmed this vulnerability affects Google Chrome on Microsoft
Windows XP SP2 platform.
The versions tested are:

Chrome: 1.0.154.36

Disclosure Timeline:
Disclosed: 1 January 2009
Release Date. 4 January 2009

Vendor Response:
Google acknowledges this vulnerability by reproducing the issue. Views
have been exchanged over the
 severity level of this flaw.The chrome ID of this issue is 5978.

Credit:
Aditya K Sood

Disclaimer:
The information in the advisory is believed to be accurate at the time
of publishing based on currently
available information. Use of the information constitutes acceptance for
use in an AS IS condition. There
is no representation or warranties, either express or implied by or with
respect to anything in this
document, and shall not be liable for a ny implied warranties of
merchantability or fitness for a particular
purpose or for any indirect special or consequential damages.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ