搜索
查看: 3535|回复: 0

卡巴斯基密码管理器中发现的过滤绕过漏洞

[复制链接]

签到天数: 2208 天

无影无棕学术交流家园大盘不是我家开的市场翘望股市捉妖记金融群英会

发表于 2012-8-7 08:12 | 显示全部楼层

卡巴斯基密码管理器中发现的过滤绕过漏洞

来自:MACD论坛(bbs.macd.cn) 作者:淡淡体味 浏览:3535 回复:0

马上注册,结交更多好友,享用更多功能,让你轻松玩转社区。

您需要 登录 才可以下载或查看,没有帐号?立即注册

x
安全漏洞实验室的研究人员已经确定了中等严重程度的软件过滤和验证漏洞影响卡巴斯基的密码管理器5.0.0.164和旧变种。

据有关专家介绍,该漏洞允许本地攻击者在出口过程中的恶意代码注入数据库。“该漏洞位于HTML / XML导出功能/模块及绑定脆弱名称,域名,网址,注释(上市)参数验证,”读取漏洞实验室公布的咨询。 “条目的URL嵌入在出口没有XML特殊字符进行编码时,一个条目的网址(域名)字段包含一个恶意脚本代码的HTML文件,这将在浏览器中打开导出的HTML文件时执行。“ 如果成功利用该漏洞可以杠杆坚持操作的应用程序,网络钓鱼,恶意软件的执行,甚至窃取受害人的密码明文。所有这些操作都需要只有在用户的身边介质的相互作用。 研究人员还提供1剥削的情况中,攻击者发送受害人1 1 URL的参数,具体代码巧妙地制作登录页面的一个例子。 此代码调用1的HTML或1 JavaScript的响应与URL CHMOD 777命令处理本地请求时,交换文件。 不知情的卡巴斯基密码管理顾客节省了通过应用自动填充插件的恶意登录页面。 后来,当受害者试图导出文件HTML格式,使用标准模板,执行恶意脚本文件的内容发送回攻击者所拥有的服务器 时,这个问题仍然没有得到解决。作为一个由供应商应实施的解决方案,研究人员建议在项目名称中的内容输出为HTML文件的XML特殊字符的使用。 下面是专家,以展示他们的研究结果发表的概念证明型视频。

Security researchers part of the Vulnerability Lab have identified a medium severity software filter and validation vulnerability that affects Kaspersky’s Password Manager 5.0.0.164 and older variants.

According to the experts, the flaw allows a local attacker to inject malicious code during the exportation process of a database.

“The vulnerability is located in the validation of the html/xml export function/module & the bound vulnerable name, domain, url, comment (listing) parameters,” reads the advisory published by Vulnerability Lab.

“URLs of entries are embedded in the exported HTML file without encoding XML special characters, when the URL (domain) field of an entry contains a malicious script code, this will be executed when the exported HTML file is opened in a browser.”

If exploited successfully, the vulnerability can be leveraged to persistently manipulate the application, phishing, the execution of malware, and even for stealing the victim’s passwords in clear text. All these operations require only medium interaction on the user’s side.

The researchers also provide an example of an exploitation scenario in which the attacker sends the victim a cleverly crafted login page with a specific code in the URL’s parameters.

This code calls an HTML or a JavaScript which responds to an URL with a chmod 777 command to exchange the file when processing local requests.

The unsuspecting Kaspersky Password Manager customer saves the malicious login page to the application via the AutoFill plugin.

Later, when the victim attempts to export the file in HTML format using the standard template, the malicious script is executed and the content of the file is sent back to the server owned by the attacker.

For the time being, the issue remains unaddressed. As a solution that should be implemented by the vendor, the researchers recommend the use of XML special characters in item names in the exportation of content as an HTML file.

Here is the proof-of-concept video published by the experts to demonstrate their findings.
金币:
奖励:
热心:
注册时间:
2004-9-16

回复 使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

本站声明:1、本站所有广告均与MACD无关;2、MACD仅提供交流平台,网友发布信息非MACD观点与意思表达,因网友发布的信息造成任何后果,均与MACD无关。
MACD俱乐部(1997-2019)官方域名:macd.cn   MACD网校(2006-2019)官方域名:macdwx.com
值班热线[9:00—17:30]:18292674919   24小时网站应急电话:18292674919
找回密码、投诉QQ:89918815 友情链接QQ:95008905 广告商务联系QQ:17017506 电话:18292674919
增值电信业务经营许可证: 陕ICP19026207号—2  陕ICP备20004035号

举报|意见反馈|Archiver|手机版|小黑屋|MACD俱乐部 ( 陕ICP备20004035号 )

GMT+8, 2024-4-25 00:33 , Processed in 0.062484 second(s), 8 queries , Redis On.

Powered by Discuz! X3.4

© 2001-2017 Comsenz Inc.

快速回复 返回顶部 返回列表