The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[REVS] Manipulating FTP Clients Using the PASV Command


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 5 Mar 2007 19:56:32 +0200
Subject: [REVS] Manipulating FTP Clients Using the PASV Command
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070305172639.9A0A457A8@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Manipulating FTP Clients Using the PASV Command
------------------------------------------------------------------------


SUMMARY

This paper discusses a common implementation flaw in the File Transfer 
Protocol (FTP). Several popular FTP clients are affected including web 
browsers. Some proof of concept code is presented to demonstrate how the 
vulnerability can be used to extend existing JavaScript-based port scans. 
Finally, some consideration is given to other ways in which this flaw 
could present a security risk to other FTP clients.

DETAILS

Vulnerable FTP Clients:
The following web browsers have been found to respond to malformed PASV 
responses in the way described above:
 * Firefox 1.5.0.9
 * Firefox 2.0.0.2
 * Opera 9.10
 * Konqueror 3.5.5

Several command line FTP clients have also been found to be vulnerable. 
However as the vendors have not been notified (and the author cannot think 
of an interesting way of exploiting command line clients), they have been 
omitted from this paper.

Immune FTP Clients
The following web browsers seem to ignore the IP address returned in PASV 
responses. They simply connect to the IP address to which the original 
control connection (21/TCP) was made:
 * Microsoft Internet Explorer 7.0.5730.11
 * Microsoft Internet Explorer 6.0.3790.0

FTP Client Implementation Flaw
It is possible for malicious FTP servers to cause some popular FTP clients 
to connect to TCP ports on other hosts. This allows us to extend existing 
JavaScript-based port scan techniques [spi] in the follow ways:
 * Scan ports which modern browsers would not normally connect to 
[portban]
 * Fingerprint services which do not send a banner by timing how long the 
server takes to terminate the connection
 * Perform simple  banner grabbing  to identify services running on other 
hosts

Vendor Responses:
No response was provided by either Mozilla or Opera.

KDE responded and discussed both issues. However, they have yet to be 
convinced of the severity of the FTP PASV Vulnerability. Unfortunately, 
providing POC to demonstrate banner grabbing was made harder (impossible?) 
by the crash during the reading of child FTP iframes. KDE have reproduced 
the crash and produced a patch [konqcrash].


ADDITIONAL INFORMATION

The information has been provided by  <mailto:mark@bindshell.net.> mark.
The original article can be found at:  
<http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf>; 
http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру