lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CALOy=8CSU=K-NwsG+2MDMmy6_GB0w4s_d5pCQ+4CZzhxPEu6tA@mail.gmail.com>
Date: Wed, 6 Jan 2021 11:37:16 +0100
From: Balázs Hambalkó <hambalko.balazs@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] Files.com - Auth Bypass (Fat Client)

Hi,

Vendor: Files.com
Product: Fat Client
Tested version: 3.3.6 but newer version high likely also affected
Credit: Balazs Hambalko, IT Security Consultant


This vulnerability was identified and reported promptly to the vendor in
April 2020.
The answer was they do not see any risk here.

Anyway I would like to share my POC video, only for learning purposes.

According to the vendor, there is no risk here, on the other hand, I built
up a playground and being a Domain Admin I could gain normal user's
Files.com storage access.

Personally I do not recommend using this solution in an environment where
somebody can access your C drive (using Windows Domain or common machines -
library, net coffee, and so on...)

POC: https://youtu.be/Ay_iYFtPrcs

Kind regards,
Balazs Hambalko

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ