Advertisement






Filezilla 3.17.0.0 windows installer Privileges Escalation

CVE Category Price Severity
CVE-2016-2349 CWE-269 $500 High
Author Risk Exploitation Type Date
Kacper Szurek High Local 2016-05-12
CPE
cpe:cpe:/a:filezilla:filezilla:3.17.0.0
CVSS EPSS EPSSP
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.71525 0.90282

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2016050048

Below is a copy:

Filezilla 3.17.0.0 windows installer Privileges Escalation-----------------------------------
# Exploit Title: Filezilla 3.17.0.0 windows installer Privileges Escalation
via unquoted path vulnerability
# Date: 08/05/2016
# Exploit Author: Cyril Vallicari
# Vendor Homepage: https://filezilla-project.org/
# Software Link: https://filezilla-project.org/download.php?type=client
# Version: 3.17.0.0
# Tested on: Windows 7 x64 SP1 (but it should works on all windows version)
# CVE : Asked it is reviewed (11/08/2016)
 
 
Summary : FileZilla is a free software, cross-platform FTP application,
consisting of FileZilla Client and FileZilla Server. Client binaries are
available for Windows, Linux, and Mac OS X.
 
Description : The installer of Filezilla for Windows version 3.17.0.0 and
probably prior and prone to unquoted path vulnerability .
 
The unquoted command called is : C:Program FilesFileZilla FTP
Clientuninstall.exe _?=C:Program FilesFileZilla FTP Client
 
This could potentially allow an authorized but non-privileged local user to
execute arbitrary code with elevated privileges on the system.
 
POC :
 
Put a software named "Program.exe" in C: (or named
Filezilla.exe/Filezilla FTP.exe in Program Files)
 
Then uninstall Filezilla from installer
 
After clicking "Next" on the installer window, Program.exe is execute with
Administrator rights
 
POC video : https://www.youtube.com/watch?v=r06VwwJ9J4M
 
 
Patch :
 
Fixed in version 3.17.0.1
 
---------------------------------------------------------------------


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum