CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.0 | $0-$5k | 0.10 |
A vulnerability, which was classified as critical, has been found in uTorrent (Peer-to-Peer Software) (affected version unknown). This issue affects an unknown functionality of the component Guest Account. The manipulation with an unknown input leads to a privileges management vulnerability. Using CWE to declare the problem leads to CWE-269. The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. Impacted is confidentiality, integrity, and availability.
The weakness was disclosed 01/31/2018 by Tavis Ormandy (taviso) as confirmed bug report (Website). It is possible to read the advisory at bugs.chromium.org. The public release has been coordinated in cooperation with the project team. The identification of this vulnerability is CVE-2018-25044. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. It demands that the victim is doing some kind of user interaction. Technical details are unknown but a public exploit is available. The attack technique deployed by this issue is T1068 according to MITRE ATT&CK. The advisory points out:
Finally, a minor issue - the documentation for the "guest" account feature says many actions are disabled for security, but I tested it and that it plain isn't true.
A public exploit has been developed by Tavis Ormandy (taviso) in HTTP GET Request and been published immediately after the advisory. The exploit is available at bugs.chromium.org. It is declared as functional. The code used by the exploit is:
$ curl -si 'http://guest@localhost:10000/gui/?action=getsettings&callback=error&btapp=' HTTP/1.1 200 OK Connection: keep-alive Content-Length: 16572 Content-Type: text/javascript Set-Cookie: GUID=6yY1pkIHHMvvHo8tgOYu; path=/ Cache-Control: no-cache {"build":44090,"settings": [ ["install_modification_time",0,"0",{"access":"Y"}] …
Upgrading eliminates this vulnerability.
math.sci.hiroshima-u.ac.jp is providing further details. The entries VDB-113803, VDB-113804, VDB-113805 and VDB-113806 are pretty similar. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Name
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.1VulDB Meta Temp Score: 7.0
VulDB Base Score: 6.3
VulDB Temp Score: 5.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 8.8
NVD Vector: 🔍
CNA Base Score: 6.3
CNA Vector (VulDB): 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Privileges managementCWE: CWE-269 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Functional
Author: Tavis Ormandy (taviso)
Programming Language: 🔍
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Exploit Delay Time: 🔍
Timeline
01/31/2018 🔍01/31/2018 🔍
02/25/2018 🔍
06/04/2022 🔍
02/10/2023 🔍
Sources
Advisory: bugs.chromium.orgResearcher: Tavis Ormandy (taviso)
Status: Confirmed
Coordinated: 🔍
CVE: CVE-2018-25044 (🔍)
GCVE (CVE): GCVE-0-2018-25044
GCVE (VulDB): GCVE-100-113807
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
See also: 🔍
Entry
Created: 02/25/2018 12:46 PMUpdated: 02/10/2023 10:02 AM
Changes: 02/25/2018 12:46 PM (50), 01/14/2020 08:33 PM (2), 06/04/2022 02:27 PM (2), 02/10/2023 10:01 AM (3), 02/10/2023 10:02 AM (28)
Complete: 🔍
Cache ID: 18:E47:40
No comments yet. Languages: en.
Please log in to comment.