Remote Compromise Vulnerability in BadBlue Personal File Sharing Program

A vulnerability in BadBlue Web Based File Sharing Program Personal Edition 1.7 through 2.2 can let an attacker gain full administrative control over the vulnerable system.

Ken Pfeil

May 23, 2003

2 Min Read
ITPro Today logo in a gray background | ITPro Today

Reported May 20, 2003, by Matt Murphy.

 

 

VERSIONS AFFECTED

 

  • BadBlue Web Based File Sharing Program, Personal Edition 1.7 through 2.2

 

DESCRIPTION

 

A vulnerability in BadBlue Web Based File Sharing Program Personal Edition 1.7 through 2.2 can let an attacker gain full administrative control over the vulnerable system. This vulnerability is partially the result of the software performing two security checks (i.e., binary replacement of the first two characters in the requested file extension and the requirement that requests to access .hts files are submitted by 127.0.0.1 and contain a proper 'Referer' header) in an incorrect order.

 

DEMONSTRATION

 

The discoverer posted the following code as proof of concept:

 

An example of this exploit is as follows:

 

http://localhost/ext.dll?mfcisapicommand=loadpage&page=admin.ats&a0=add&a1=root&a2=%5C

 

This adds '/root' as '', revealing the server's primary volume. An attacker can then traverse the volume with the directory indexing feature of the server.

 

VENDOR RESPONSE

 

BadBlue has releasedversion 2.3, which isn't vulnerable to this condition.

 

CREDIT

Discovered byMatt Murphy.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like