Twenty Year Anniversary

FTP Commander 8.02 DLL Hijacking

FTP Commander 8.02 DLL Hijacking
Posted Jul 29, 2017
Authored by Ye Yint Min Thu Htut

FTP Commander version 8.02 suffers from a dll hijacking vulnerability.

tags | advisory
systems | windows
MD5 | 7c3e0cb6cc1e25e5777d095f3a52b663

FTP Commander 8.02 DLL Hijacking

Change Mirror Download
Author: Ye Yint Min Thu Htut

1. OVERVIEW

The FTP Commander is vulnerable to Insecure DLL Hijacking
Vulnerability. Similar terms that describe this vulnerability
have been come up with Remote Binary Planting, and Insecure DLL
Loading/Injection/Hijacking/Preloading.

2. PRODUCT DESCRIPTION

FTP Commander is an FTP client for Windows. The program is developed by
InternetSoft Corporation. Features include multiple connections, SSH, SSL,
scheduler and backup tool, proxy and firewall support, chmod features, and
localization for over 20 languages

3. VULNERABILITY DESCRIPTION

The FTP Commander application passes an insufficiently qualified path in
loading an external library when a user launch the application

Affected Library List
---------------------
# dwmapi.dll

4. VERSIONS AFFECTED

8.02 and prior

5. PROOF-OF-CONCEPT/EXPLOIT

http://blog.pentest.space/2017/07/023-ftp-commander-802-unsafe-dll.html

Tested Platform: Windows 7 x64 (Fresh Windows)

6. IMPACT

This occurs when an application fails to resolve a DLL because the DLL does
not exist in the specified path or search directories. If this happens, a
malicious Dll with the same name can be placed in the specified path
directory leading to remote code execution.


7. SOLUTION

For application developers:
Require set paths for DLLs in applications

For system administrators:
Disable write permissions to relative application folders
Utilize least privilege access to prevent users (and applications) from
having too much access to the system

For both groups:
Microsoft has a great article explaining the DLL-related registry keys
and how they can be used to protect applications -
http://blogs.technet.com/b/srd/archive/2010/08/23/more-
information-about-dll-preloading-remote-attack-vector.aspx


8. VENDOR

InternetSoft Corporation
www.internet-soft.com/ftpcomm.htm

9. CREDIT

This vulnerability was discovered by Ye Yint Min Thu htut,
http://pentest.space

10. DISCLOSURE TIME-LINE

07-26-2017: vulnerability discovered
07-26-2010: notified vendor
08-29-2017: vulnerability disclosed

11. REFERENCES
https://support.microsoft.com/en-us/help/2389418/secure-
loading-of-libraries-to-prevent-dll-preloading-attacks
https://cwe.mitre.org/data/definitions/427.html

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    9 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    34 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close