exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

thebat.traverse.txt

thebat.traverse.txt
Posted Jan 9, 2001
Authored by 3APA3A | Site security.nnov.ru

The Bat! v1.48f and below has a client side vulnerability which allows malicious mail messages to add any files in any directory on the disk where user stores his attachments.

tags | exploit
SHA-256 | 1adbf87e7851d5d7a9b23c17e6184b5d212a67dbc7d0715a21f84ca3f403a183

thebat.traverse.txt

Change Mirror Download
SECURITY.NNOV advisory - The Bat! directory traversal


Topic: The Bat! attachments directory traversal
Author: 3APA3A <3APA3A@security.nnov.ru>
Affected Software: The Bat! Version <= 1.48f (latest available)
Vendor: RitLabs
Risk: Average
Impact: It's possible to add any file in any directory
on the disk with file archive.
Type: Client software vulnerability
Remotely exploitable: Yes
Released: 21 December 2000
Vendor contacted: 21 December 2000
Public release: 04 January 2001
Vendor URL: http://www.ritlabs.com
Software URL: http://www.thebat.net
SECURITY.NNOV URL: http://www.security.nnov.ru (in Russian)
Credits: Ann Lilith <lilith-@rambler.ru> (wish her good
luck, she will need it :)

Background:
The Bat! is extremely convenient commercially available MUA for
Windows (will be best one then problem will be fixed, I believe) with
lot of features by Ritlabs. The Bat! has a feature to store attached
files independently from message in directory specified by user. This
feature is disabled by default, but commonly used.

Problem:
The Bat! doesn't allow filename of attached file to contain '\'
symbol, if name is specified as clear text. The problem is, that this
check isn't performed then filename specified as RFC's 2047
'encoded-word'.

Impact:
It's possible to add any files in any directory on the disk where user
stores his attachments. For example, attacker can decide to put
backdoor executable in Windows startup folder. Usually it's impossible
to overwrite existing files, because The Bat! will add number to
filename if file already exists. The only case then files can be
overwritten is then "extract files to" is configured in message
filtering rules and "overwrite file" is selected.

Vendor:
Vendor (Rit Labs) was contacted on December, 21. Last reply was on
December, 22. Vendor claims the patch is ready, but this patch was not
provided for testing and version distributed through FTP site
ftp://ftp.ritlabs.com/pub/the_bat/the_bat.exe IS vulnerable. It looks
like all the staff is on their X-mas vocations or they don't want to
release new version because latest one was freshly released (file
dated December 20).


Exploitation:
By default The Bat! stores attachments in C:\Program Files\The
Bat!\MAIL\%USERNAME%\Attach folder.
(BTW: I don't think storing MAIL in Program Files instead of User's
profile or user's home directory is good idea).
In this configuration

Content-Type: image/gif
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="=?iso8859-1?B?Li5cLi5cLi5cLi5cLi5cV2luZG93c1xTdGFydCBNZW51XFByb2dyYW1zXFN0YXJ0dXBcMTI
zLmV4ZQ==?="

will save attached file as
C:\Windows\Start Menu\Programs\Startup\123.exe
( ..\..\..\..\..\Windows\Start Menu\Programs\Startup\123.exe )

There is no need to know exact level of directory, just add enough
"..\" in the beginning and you will be in the root of the disk.


Workaround:
Disable "File attachment stored separate from message" option. In case
this option is disabled there is still 'social engineering' problem,
because The Bat! suggests 'spoofed' directory to save file then you
choose to save it. Be careful.


Solution:
Not available yet. Wait for new version.

This advisory is being provided to you under RFPolicy v.2 documented
at http://www.wiretrip.net/rfp/policy.html.



--
/\_/\
{ . . } |\
+--oQQo->{ ^ }<-----+ \
| 3APA3A U 3APA3A } You know my name - look up my number (The Beatles)
+-------------o66o--+ /
|/
SECURITY.NNOV is http://www.security.nnov.ru - Russian security project
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close