what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Weeny Audio Cutter Software 1.5 Content Injection

Weeny Audio Cutter Software 1.5 Content Injection
Posted Feb 24, 2018
Authored by Ajay Gowtham

Weeny Audio Cutter Software version 1.5 suffers from a content injection vulnerability.

tags | advisory
SHA-256 | 53f7cd379147df72f2c98fd29688727773be46310992b4ed3b436766e4119707

Weeny Audio Cutter Software 1.5 Content Injection

Change Mirror Download
Content-Injection Phishing Vulnerability

Technical Details:
=================
Vulnerability Title: Audio Cutter Software - Content-Injection Phishing
Vulnerability
Tool Name: Weeny Audio Cutter Software v1.5
Critical Level: Low
Type: Local
Author: Ajay Gowtham aka AJOXR (Blackhat forums)
Type: Software Security Bug
Product Download: http://www.weenysoft.com/free-audio-cutter.html

Overview of Content-Injection Phishing Vulnerability:
=====================================================
Content-Injection Phishing describes the situation where hackers replace
part of the content of a legitimate site with false content designed to
mislead or misdirect the user into giving up their confidential information
to the hacker. For example, hackers may insert malicious code to log user's
credentials or an overlay which can secretly collect information and
deliver it to the hacker's phishing server.

Technical Impact:
=================
Once the injection is performed by an attacker, when ever next an user
uninstalls the vulnerable product from their system could lead to
Content-Injection phishing attack which allows user to collect any
sensitive information and or deliver feedback form based webpage to gather
their personal information.

In this software, affected file "unins000.exe" which fetches file from
insecure library and loads the content. where an attacker can able to
inject the malicious content. which might be phishing, tabnabbing or spear
phishing attacks etc. This allows attacker to gather user information by
convencing with fall prey content such as., Win movie tickets, discout
coupons etc.

Vulnerability Overview:
=======================
The software does not neutralize or incorrectly neutralizes
user-controllable input before it is placed in output that is used as a web
page that is served to the users.

Solution:
=========
The file (i.e., "unins000.exe") should sanitize the fetching .htm documents
from installed location, in case any user injects the code malicious code
should be cross verified for program integrity to avoid content
misplacement.

PoC:
====
https://youtu.be/7Ar00dc1XME
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close