Nytro Posted October 22, 2015 Report Posted October 22, 2015 (edited) Exploit Title: "PwnSpeak" a 0day Exploit for TeamSpeak Client <= 3.0.18.1 RFI/ to RCEDate: 12/10/2015Author: Scurippio <scurippio@anche.no> /?? (0x6FB30B11 my pgp keyid)Vendor Homepage: https://www.teamspeak.com/Application: TeamSpeak 3Version: TeamSpeak3 Client 3.0.0 -?? 3.0.18.1Platforms: Windows, Mac OS X and LinuxExploitation: RemoteRisk : Very High=========The Bug=========The bug is a simple but Critical RFI(Remote File Inclusion), and in my test case on "Windows" you can reach remote code execution.By changing the channel description you can insert a bb tag with malicious content.There are a few problems with the image caching on disk.1: There is no check on file extension.2: There is no file renaming, and you can fake the extension so you can create in the cache a malicious executable file like hta, scr, msi, pif, vbs etc....Link: http://www.securityfocus.com/archive/1/536738 Edited October 22, 2015 by Nytro Quote