what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Transmission BitTorrent Cross Site Scripting

Transmission BitTorrent Cross Site Scripting
Posted Jul 28, 2012
Authored by Justin C. Klein Keane

Transmission BitTorrent client versions prior to 2.61 suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2012-4037
SHA-256 | 818ec13f1f8cc75dec858bf1a430235ca3eb87f12cf8abc296ca9d260ec5fb0b

Transmission BitTorrent Cross Site Scripting

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Vulnerability Report

Author: Justin C. Klein Keane <justin@madirish.net>
Reported: July 19, 2012

CVE-2012-4037

Description of Vulnerability:
- -----------------------------
Transmission (http://www.transmissionbt.com) is a popular, cross
platform, open source BitTorrent client. Transmission includes
functionality to enable a web based display of the application.
Unfortunately this web based client doesn't sanitize text from
.torrent files that are loaded into the client resulting in an
arbitrary script injection (or cross site scripting (XSS)) vulnerability.

Impact
- ------
Clients loading a maliciously crafted .torrent file into Transmission
and viewing the web client could be subject to arbitrary script
injection, allowing an attacker to run arbitrary code in the context
of the victim's web browser. This could lead to privacy compromises
(such as if the script "phoned home" to another URL with client
information) or client side attacks (such as drive by downloads).

Systems affected:
- -----------------
Transmission 2.50 on Fedora 17 was tested and shown to be vulnerable,
but Transmission is a cross platform tool so it is possible versions
for other operating systems (such as Mac, Windows, and other Linux)
are vulnerable as well.

Mitigating factors:
- -------------------
The information displayed via the Transmission web client is loaded
via AJAX calls and is entirely event driven. This means malicious
scripts must be crafted to exploit the way in which content is
dynamically rendered. This presents some barrier, but is easy
bypassed by injecting event driven elements in the display. Malicious
script elements in the torrent name are easily visible via the desktop
client, but malicious elements in the 'created by' or 'comments'
elements are more difficult for end users to detect.


Proof of Concept Exploit:
- -------------------------
1. Create a malicious torrent file (Example below) that includes
arbitrary script elements in the name, comment, or authored by elements.
2. Install and start up the Transmission client
3. In Transmission select Edit->Preferences then click the 'Web' tab
4. Check the 'Enable web client'
5. Open a web browser and navigate to the web based client
6. Click the 'Open Torrent' icon in the upper left and select the
malicious file from step #1
7. Highlight the torrent and click the 'Toggle Inspector' icon in the
upper left.
8. Mouse over the "Mouse over me" sections in the information pane to
view the rendered JavaScript alert boxes.

Vendor Response:
- -----------------
Upgrade to Transmission 2.61 or later.

Sample Malicious Torrent:
- -------------------------
d8:announce24:http://www.madirish.net/7:comment63:<div
onmouseover="javascript:alert('xss');">Mouse over me</div>10:created
by63:<div onmouseover="javascript:alert('xss');">Mouse over
me</div>13:creation
datei1342553922e8:encoding5:UTF-84:infod6:lengthi323584e4:name44:appsec.ppt<script>alert('namexss');</script>12:piece
lengthi32768e6:pieces200:°åeì<îÃú[Ò? 9jØ<„LuŒ*B≈ÍôÒ±ıîwÑ
√b]Ú‘öÊS°ÜÕÁä0ï e ©Ö:Řƒúß«
v¬G6ê˜bfi†#PØ;É~JÔ~áÙ±=AÎ≤—ï–˝~öÛ€9ï’PH°k#ÿ0y‘EèÊS* /æfM;˝5√ıuÅ?¡‡ë?ySgË>ıQËz4ï<ŒÿµufÕàâ~˘Îs¬Sb◊¿DA·8}¥0∂∂-_Ä[ã≠H}*õf
Èj7:privatei0eee

- --
Justin C. Klein Keane
http://www.MadIrish.net
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iPwEAQECAAYFAlARYfYACgkQkSlsbLsN1gCiAgb/R8B1p7HDEPEBzRiwz2GcwIa9
1diPHnlKTzhRTcY9GgFNfsdDL6NYO4J19tlxxzZIfjSCOI/WUM1rZhsFmJwlMA4E
eW07cmc/kmHn5a+3a3/pBd2lhR7kfQkzN4U5/FUCsmlF03B4lZjfreoqFuarID1z
dSi/LMU9XJTVfyEIWU9kZiSGE1oeEpdMmLGAWgZ1dCPXhbWE4UK0zF25/Y0YEjl9
6ZRcPX2PCE863XVcUzGrdkodqcN2VJqnzEwpVCc8yP1qwOjLSppX2vM7puMHpoUq
mJFLmCdOqrf2oWugB8Y=
=M+gZ
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close