exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Core FTP Server 1.2 DoS / Traversal / Disclosure

Core FTP Server 1.2 DoS / Traversal / Disclosure
Posted Feb 5, 2014
Authored by Fara Denise Rustein, Luciano Martins

Core FTP Server version 1.2 suffers from denial of service race condition, password disclosure, and directory traversal vulnerabilities.

tags | exploit, denial of service, vulnerability, file inclusion, info disclosure
advisories | CVE-2014-1441, CVE-2014-1442, CVE-2014-1443
SHA-256 | cdd4723d3be809710e87bcb55c3ae14a73cde7aec28bad3f8f208fa620b79cce

Core FTP Server 1.2 DoS / Traversal / Disclosure

Change Mirror Download
"Core FTP Server Vulnerabilities"

******************************************************************************

- Affected Vendor: Core FTP Server
- Affected System: Core FTP Server software (Version 1.2, build 511, 32-bit)
- Vendor Disclosure Date: January 11th, 2014
- Public Disclosure Date: February 5th, 2014
- Vulnerabilities' Status: Fixed

******************************************************************************

Associated CVEs:

1) CVE-2014-1441:
Race condition leading to Denial of Service on the "AUTH SSL" command with invalid SSL data
CWE-617: Reachable Assertion - http://cwe.mitre.org/data/definitions/617.html

2) CVE-2014-1442:
"XCRC" Directory Traversal Information Disclosure
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') - http://cwe.mitre.org/data/definitions/22.html

3) CVE-2014-1443:
Password Disclosure Vulnerability
CWE-226: Sensitive Information Uncleared Before Release - https://cwe.mitre.org/data/definitions/226.html

******************************************************************************

DESCRIPTIONS
===========

1) CVE-2014-1441:
Race condition leading to Denial of Service on the "AUTH SSL" command with invalid SSL data:

We have observed that when using the AUTH SSL command, followed by invalid data, the CORE FTP application crashes.
This would allow a remote malicious individual to generate a denial of service condition and disrupt services.

+ Proof of Concept:
- Use the "AUTH SSL" command.
- Hit the "enter" key twice.
- Observe that the application crashes.

2) CVE-2014-1442:
"XCRC" Directory Traversal Information Disclosure:

We have observed that the CORE FTP software is vulnerable to Directory Traversal by leveraging the "XCRC" command.
This allows a remote malicious individual to determine the existence of a file outside the current FTP root directory.

+ Proof of Concept:
- Log in to the Core FTP Server.
- Use the "XCRC" command with a filename that does not exist on the user designated root directory.
- Observe the "550 File not found.." response.
- Use the "XCRC" command with a filename belonging to a file residing directly outside the user designated root folder (one level higher than the root directory).
- Observe the "550 File not found.." response.
- Use the "XCRC" command with the same filename as before, but add "/../" in front of the file name.
- Observe the 250 response.

3) CVE-2014-1443:
Password Disclosure Vulnerability:

We have observed that using a specifically crafted string it is possible to obtain the password belonging to the user that last logged in to the Core FTP Server.
This appears to be related to a buffer size issue. The crafted string requires 211 characters in order to work.

+ Proof of Concept:
- Log into the Core FTP Server with a valid user.
- Close the terminal.
- Use the "USER" command with the following string: "%xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
- Observe that the previously used password is disclosed

******************************************************************************

- Fix information: http://coreftp.com/forums/viewtopic.php?t=2985707

- Related Links: Deloitte Argentina - www.deloitte.com/ar
- Feedback: If you have any questions, comments, concerns, updates or suggestions please feel free to send them to:
+ frustein@deloitte.com (tw: @fararustein)
+ lmartins@deloitte.com (@clucianomartins).

******************************************************************************

Credits:

CVE-2014-1441:
1. Race condition leading to Denial of Service on the "AUTH SSL" command with invalid SSL data
Discovered by Luciano Martins (lmartins@deloitte.com)

CVE-2014-1442:
2. "XCRC" Directory Traversal Information Disclosure
Discovered by Fara Rustein (frustein@deloitte.com)

CVE-2014-1443:
3. Password Disclosure Vulnerability
Discovered by Luciano Martins (lmartins@deloitte.com)

******************************************************************************

Fara Rustein | Senior Consultant
Cyber Security - Deloitte
The key is searching. Vs nfv zphz qsui ghzf zg xhv yvzqy gj tiwap.

 
Deloitte se refiere a una o más de las firmas miembros de Deloitte Touche Tohmatsu Limited, una compañía privada del Reino Unido limitada por garantía, y su red de firmas miembros, cada una como una entidad única e independiente y legalmente separada. Una descripción detallada de la estructura legal de Deloitte Touche Tohmatsu Limited y sus firmas miembros puede verse en el sitio web http://www.deloitte.com/about.                           La información de este mail es confidencial y concierne únicamente a la persona a quien está dirigida. Si este mensaje no está dirigido a usted, por favor tenga presente que no tiene autorización para leer el resto de este e-mail, copiarlo o derivarlo a cualquier otra persona que no sea aquella a quien está dirigido. Si recibe este mail por error, por favor, avise al remitente, luego de lo cual rogamos a usted destruya el mensaje original. No se puede responsabilizar de ningún modo a Deloitte & Co. S.A. ni a sus subsidiarias por cualquier consecuencia o daño que pueda resultar del apropiado y completo envío y recepción del contenido de este e-mail.
 
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see http://www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. 
The information in this e-mail is confidential and intended solely for the person to whom it is addressed. If this message is not addressed to you, please be aware that you have no authorization to read the rest of this e-mail, to copy it or to furnish it to any person other than the addressee. Should you have received this e-mail by mistake, please bring this to the attention of the sender, after which you are kindly requested to destroy the original message. Deloitte & Co. S.A. and subsidiaries cannot be held responsible or liable in any way whatsoever for and/or in connection with any consequences and/or damage resulting from the proper and complete dispatch and receipt of the content of this e-mail.


Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close