In association with heise online

12 March 2008, 13:27

Remote controlled FTP commands via Internet Explorer

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Security researchers from Rapid7 have discovered a vulnerability in Internet Explorer 5 and 6 that can be exploited to cause a browser to issue FTP commands. Exploitation requires the user to follow a crafted link in a web page. Attackers can use this exploit to delete, rename, steal or upload files in the name of the user or with the user’s IP address.

IE5 and IE6 fail to filter FTP URLs adequately. By inserting URL encoded carriage return / line feed characters (%0D%0A) in FTP links, it is possible to append FTP commands to the URL. These commands are then executed on the server. A security advisory by Rapid7 includes a sample link which attempts to delete the file foo.txt from the FTP server:

<iframe src="ftp://user@site:port/%0D%0ADELE%20foo.txt%0D%0A//"/>

This will of course only succeed if the FTP account selected has the requisite privileges. The URL also appears to demonstrate a further vulnerability, as a result of which the saved password from a previous login to the FTP server in the same browser session is used automatically when logging in - according to the advisory this is initiated by the double slash at the end of the link.

The advisory states that Microsoft researchers have been informed of the vulnerability. Work on a patch to fix the bug is apparently in progress. Since Internet Explorer 7 is not affected by the bug, switching to the newer version is one remedy for the problem.

See also:

(mba)

Print Version | Send by email | Permalink: http://h-online.com/-736004
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit