exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

maxthon_mulvulns.txt

maxthon_mulvulns.txt
Posted Apr 17, 2005
Authored by Aviv Raff | Site raffon.net

Maxthon (essentially a wrapper for Internet Explorer to allow tabbed browsing, plugins, etc.) can be exploited by a malicious website to read and write arbitrary local files on the machine running it.

tags | advisory, arbitrary, local
SHA-256 | 2ff28f0629769068a8a4d27d251a092c75a2951bd09734d553331d287e6d1042

maxthon_mulvulns.txt

Change Mirror Download
This is a multi-part message in MIME format.

------=_NextPart_000_0013_01C53C65.EFC86BA0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit


Maxthon browser multiple vulnerabilities advisory


URL: http://www.raffon.net/advisories/maxthon/multvulns.html
Date: April 08, 2005
Author: Aviv Raff


Introduction

"Maxthon Internet Browser software is a powerful tabbed browser with a
highly customizable interface. It is based on the Internet Explorer browser
engine..." (From Maxthon website <http://www.maxthon.com/> ).
In order to enhance the user experience, Maxthon uses a model of plug-ins.
Maxthon exposes an API, which allows plug-ins to read/write to files. These
functions allow the plug-ins to perform those operations on any directory in
the running computer. Moreover, In order to call Maxthon's API functions
from a plug-in, a "secure id" must be provided. This id can be easily
fetched, and therefore the API functions can be called from any web site the
user visits.


Technical Details

1) Maxthon's plug-ins use readFile and writeFile API functions to read and
write from/to files on the plug-in's directory. It is possible to read and
write from/to files on any other directory, due to lack of directory
traversal character sequences validation.
2) Maxthon allows calling to API functions only when a "security id" of a
plug-in is provided. The "security id" of a plug-in is auto-generated when a
plug-in is used for the first time in the current Maxthon session. Side bar
plug-ins include the "security id" in a file named "max.src" on the
plug-in's directory. By including this file in a script on a web page, it is
possible to call functions that will read and write to local files, manage
tabs, etc.

A combination of the above vulnerabilities can be exploited to potentially
allow remote code execution.
Tested versions: 1.2.0; 1.2.1
Older versions might also be affected.


Proof of Concept

The following is a local file reading proof of concept.
Default Maxthon installation is assumed, and also that the, installed by
default, M2Bookmark side bar plug-in was already used on the current Maxthon
session.
http://www.raffon.net/advisories/maxthon/nosecidpoc.html



Timetable

27-Mar-2005: Vendor informed.
28-Mar-2005: Vendor confirmed vulnerability.
08-Apr-2005: Vendor published a fixed version.
08-Apr-2005: Public disclosure.



Solution

Upgrade to version 1.2.2.



Disclaimer: The information in this advisory and any of its demonstrations
is provided "as is" without warranty of any kind.

-- Copyright C 2005 Aviv Raff. --


------=_NextPart_000_0013_01C53C65.EFC86BA0
Content-Type: text/html;
charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.2900.2604" name=3DGENERATOR></HEAD>
<BODY>
<DIV><FONT size=3D2>
<H3>Maxthon browser multiple vulnerabilities advisory</H3>
<H5><SPAN class=3D296140516-08042005>URL: <A=20
href=3D"http://www.raffon.net/advisories/maxthon/multvulns.html">http://w=
ww.raffon.net/advisories/maxthon/multvulns.html</A><BR></SPAN>Date:=20
April 08, 2005<BR>Author: Aviv Raff </H5>
<H4><U>Introduction</U></H4>"Maxthon Internet Browser software is a =
powerful=20
tabbed browser with a highly customizable interface. It is based on the =
Internet=20
Explorer browser engine..." (From Maxthon <A=20
href=3D"http://www.maxthon.com/">website</A>).<BR>In order to enhance =
the user=20
experience, Maxthon uses a model of plug-ins. Maxthon exposes an API, =
which=20
allows plug-ins to read/write to files. These functions allow the =
plug-ins to=20
perform those operations on any directory in the running computer. =
Moreover, In=20
order to call Maxthon's API functions from a plug-in, a "secure id" must =
be=20
provided. This id can be easily fetched, and therefore the API functions =
can be=20
called from any web site the user visits.<BR>
<H4><U>Technical Details</U></H4>1) Maxthon's plug-ins use readFile and=20
writeFile API functions to read and write from/to files on the plug-in's =

directory. It is possible to read and write from/to files on any other=20
directory, due to lack of directory traversal character sequences=20
validation.<BR>2) Maxthon allows calling to API functions only when a =
"security=20
id" of a plug-in is provided. The "security id" of a plug-in is =
auto-generated=20
when a plug-in is used for the first time in the current Maxthon =
session. Side=20
bar plug-ins include the "security id" in a file named "max.src" on the=20
plug-in's directory. By including this file in a script on a web page, =
it is=20
possible to call functions that will read and write to local files, =
manage tabs,=20
etc.<BR><BR>A combination of the above vulnerabilities can be exploited =
to=20
potentially allow remote code execution.<BR><B>Tested versions:</B> =
1.2.0;=20
1.2.1<BR>Older versions might also be affected. <BR>
<H4><U>Proof of Concept</U></H4>The following is a local file reading =
proof of=20
concept.<BR>Default Maxthon installation is assumed, and also that the,=20
installed by default, M2Bookmark side bar plug-in was already used on =
the=20
current Maxthon session.<BR><A=20
href=3D"http://www.raffon.net/advisories/maxthon/nosecidpoc.html">http://=
www.raffon.net/advisories/maxthon/nosecidpoc.html</A><BR><BR>
<H4><U>Timetable</U></H4>27-Mar-2005: Vendor informed.<BR>28-Mar-2005: =
Vendor=20
confirmed vulnerability.<BR>08-Apr-2005: Vendor published a fixed=20
version.<BR>08-Apr-2005: Public disclosure.<BR><BR>
<H4><U>Solution</U></H4>Upgrade to version 1.2.2.<BR><BR>
<H5>Disclaimer: The information in this advisory and any of its =
demonstrations=20
is provided "as is" without warranty of any kind.</H5>-- Copyright =
&copy; 2005 Aviv=20
Raff. --<BR></FONT></DIV></BODY></HTML>

------=_NextPart_000_0013_01C53C65.EFC86BA0--

Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close