exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

opera07autodel.txt

opera07autodel.txt
Posted Dec 29, 2003
Authored by Nesumin | Site opera.rainyblue.org

Opera versions 7.22 and below allow for a remote site to overwrite local files during temporary file creation due to a lack of sanitizing filenames.

tags | advisory, remote, local
SHA-256 | 60c29d87a6f9de9b85286c7f945db2574fa8ee1f7e1c33632321555b1477c9ea

opera07autodel.txt

Change Mirror Download
----------------------------------------------------------------------
TITLE : [Opera 7] Arbitrary File Delete Vulnerability
-= How Dare You Delete My Important Files? =-
PRODUCT : Opera 7 for Windows
VERSIONS : 7.22 build 3221 (JP:build 3222)
7.21 build 3218 (JP:build 3219)
7.20 build 3144 (JP:build 3145)
7.1x
7.0x
VENDOR : Opera Software ASA (http://www.opera.com/)
SEVERITY : Critical.
An arbitrary file could be deleted on Local Disk
from Remote.
DISCOVERED BY : nesumin
AUTHOR : :: Operash ::
REPORTED DATE : 2003-11-26
RELEASED DATE : 2003-12-12
ORIGINAL URL : http://opera.rainyblue.org/adv/opera07-autodel-en.php
----------------------------------------------------------------------

0. PRODUCT
============

Opera for windows is a GUI base WEB Browser.
Opera Software ASA (http://www.opera.com/)


1. DESCRIPTION
================

Displaying a Download Dialog, Opera creates a temporary file.
But this file name is not sanitized enough, so that an existing
file can be deleted.

Exploiting this vulnerability, an attacker can delete
an arbitrary existing file on a local disk from remote.

With this vulnerability, there could be following risks;

* Destruction of the system.
* Destruction of application data.


2. SYSTEMS AFFECTED
=====================

7.22 build 3221 (JP:build 3222)
7.21 build 3218 (JP:build 3219)
7.20 build 3144 (JP:build 3145)
7.1x
7.0x


3. SYSTEMS NOT AFFECTED
=========================

7.23 build 3227 (JP:build 3226)


4. EXAMINES
=============

Opera for Windows:
Opera 7.23 build 3227 (JP:build 3226)
Opera 7.22 build 3221 (JP:build 3222)
Opera 7.21 build 3218 (JP:build 3219)
Opera 7.20 build 3144 (JP:build 3145)
Opera 7.11 build 2887
Opera 7.11 build 2880
Opera 7.10 build 2840
Opera 7.03 build 2670
Opera 7.02 build 2668
Opera 7.01 build 2651

Platform:
Windows 98SE Japanese
Windows 2000 Professional SP4 Japanese
Windows XP Professional SP1 Japanese


5. SOLUTION
===============

Upgrade to version 7.23 or later version.


6. TECHNICAL DETAILS
======================

Displaying a Download Dialog, Opera creates a temporary file
which is based on the name used while downloading in the
temporary directory. This temporary file is for searching
the associated application.

---------------------------------------------------------------
ex)

Download URL:
"http://server/path/FILENAME.ext"

Temporary Filename:
"c:\windows\temp\FILXXX.tmp.FILENAME.ext"

(XXX is random string, like "01A")
---------------------------------------------------------------

But this temporary file name is not sanitized enough so that
it can possibly contain the illegal character string '..%5C'.
The file with this string can be located on any paths on the
same drive as the temporary file.
If there's an already existing file with the same name on
the path, it will be overwritten and deleted soon.

---------------------------------------------------------------
ex)

Download URL:
http://server/path/AAAAAAAAAA%5C..%5C..%5Ccalc.exe

Temporary Filename:
"c:\windows\temp\AAAXXX.tmp.AAAAAAAAAA\..\..\calc.exe"

this is... "c:\windows\calc.exe"

---------------------------------------------------------------

Therefore, if a user goes to a malicious URL which makes Opera
display the Download Dialog, his files could be deleted with
this vulnerability.


The conditions of deletable files;

1. File's path can be specified with a relative path.
from a temporary directory.
2. File name contains '.' .
3. Writable file within Opera process's authority.
4. Except "Read Only" attribute on Windows 9x Kernel.
Except "Read Only", "System" or "Hide" attributes on
Windows NT Kernel.


7. SAMPLE CODE
================

None release.


8. TIME TABLE & VENDOR STATUS
===============================

2003-10-09 Discovered this vulnerability.
2003-11-26 Reported to vendor.
2003-12-12 Released this advisory.

No reply from vendor.


9. DISCLAIMER
===============

A. We cannot guarantee the accuracy of all statements in this information.
B. We do not anticipate issuing updated versions of this information
unless there is some material change in the facts.
C. And we will take no responsibility for any kinds of disadvantages by
using this information.
D. You can quote this advisory without our permission if you keep the following;
a. Do not distort this advisory's content.
b. A quoted place should be a medium on the Internet.
E. If you have any questions, please contact to us.


10. CONTACT, ETC
==================

:: Operash :: http://opera.rainyblue.org/

imagine (Operash Webmaster)
nesumin <nesumin[at]softhome[dot]net>


Thanks to :

anima
melorin
piso
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close