Exploit the possiblities

FTP Commander 8.02 DLL Hijacking

FTP Commander 8.02 DLL Hijacking
Posted Jul 29, 2017
Authored by Ye Yint Min Thu Htut

FTP Commander version 8.02 suffers from a dll hijacking vulnerability.

tags | advisory
systems | windows
MD5 | 7c3e0cb6cc1e25e5777d095f3a52b663

FTP Commander 8.02 DLL Hijacking

Change Mirror Download
Author: Ye Yint Min Thu Htut

1. OVERVIEW

The FTP Commander is vulnerable to Insecure DLL Hijacking
Vulnerability. Similar terms that describe this vulnerability
have been come up with Remote Binary Planting, and Insecure DLL
Loading/Injection/Hijacking/Preloading.

2. PRODUCT DESCRIPTION

FTP Commander is an FTP client for Windows. The program is developed by
InternetSoft Corporation. Features include multiple connections, SSH, SSL,
scheduler and backup tool, proxy and firewall support, chmod features, and
localization for over 20 languages

3. VULNERABILITY DESCRIPTION

The FTP Commander application passes an insufficiently qualified path in
loading an external library when a user launch the application

Affected Library List
---------------------
# dwmapi.dll

4. VERSIONS AFFECTED

8.02 and prior

5. PROOF-OF-CONCEPT/EXPLOIT

http://blog.pentest.space/2017/07/023-ftp-commander-802-unsafe-dll.html

Tested Platform: Windows 7 x64 (Fresh Windows)

6. IMPACT

This occurs when an application fails to resolve a DLL because the DLL does
not exist in the specified path or search directories. If this happens, a
malicious Dll with the same name can be placed in the specified path
directory leading to remote code execution.


7. SOLUTION

For application developers:
Require set paths for DLLs in applications

For system administrators:
Disable write permissions to relative application folders
Utilize least privilege access to prevent users (and applications) from
having too much access to the system

For both groups:
Microsoft has a great article explaining the DLL-related registry keys
and how they can be used to protect applications -
http://blogs.technet.com/b/srd/archive/2010/08/23/more-
information-about-dll-preloading-remote-attack-vector.aspx


8. VENDOR

InternetSoft Corporation
www.internet-soft.com/ftpcomm.htm

9. CREDIT

This vulnerability was discovered by Ye Yint Min Thu htut,
http://pentest.space

10. DISCLOSURE TIME-LINE

07-26-2017: vulnerability discovered
07-26-2010: notified vendor
08-29-2017: vulnerability disclosed

11. REFERENCES
https://support.microsoft.com/en-us/help/2389418/secure-
loading-of-libraries-to-prevent-dll-preloading-attacks
https://cwe.mitre.org/data/definitions/427.html

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close