WinHKI 1.6x Archive Extraction Directory traversal
- To: "bugs@xxxxxxxxxxxxxxxxxxx" <bugs@xxxxxxxxxxxxxxxxxxx>, "bugtraq@xxxxxxxxxxxxxxxxx" <bugtraq@xxxxxxxxxxxxxxxxx>, "content-editor@xxxxxxxxxxxxxxxxx" <content-editor@xxxxxxxxxxxxxxxxx>, "editor@xxxxxxxxxxxxxxxxx" <editor@xxxxxxxxxxxxxxxxx>, "expert@xxxxxxxxxxxxxx" <expert@xxxxxxxxxxxxxx>, "news-editor@xxxxxxxxxxxxxxxxx" <news-editor@xxxxxxxxxxxxxxxxx>, "support@xxxxxxxxxxx" <support@xxxxxxxxxxx>, "vuldb@xxxxxxxxxxxxxxxxx" <vuldb@xxxxxxxxxxxxxxxxx>, "vuln@xxxxxxxxxxx" <vuln@xxxxxxxxxxx>, "webmaster@xxxxxxxxxxx" <webmaster@xxxxxxxxxxx>, "webmaster@xxxxxxxxxxxxxxxxx" <webmaster@xxxxxxxxxxxxxxxxx>
- Subject: WinHKI 1.6x Archive Extraction Directory traversal
- From: h e <het_ebadi@xxxxxxxxx>
- Date: Tue, 21 Mar 2006 19:32:59 -0800 (PST)
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:Received:Date:From:Subject:To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=LrqZbVUknaVVwOfAL7U1pUfTz1GUSto//aXskha0oiRu6Cnrw35UQz7JKa66xpEjERYZX4ThQXofVIfknJafkHVJemVR2XRmdGifmFFqio9B9AhHBLFIgrhskHWrFpdEiVxA44v+R3KADJ1LNACCZA+Zf8XYamNZIJzHsbgQ4ME= ;
- List-help: <mailto:bugtraq-help@securityfocus.com>
- List-id: <bugtraq.list-id.securityfocus.com>
- List-post: <mailto:bugtraq@securityfocus.com>
- List-subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
- List-unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
- Mailing-list: contact bugtraq-help@xxxxxxxxxxxxxxxxx; run by ezmlm
WinHKI 1.6x Archive Extraction Directory traversal
WinHKI Archiver administrator ask me for penetration
test. here is the result :
WinHKI Archiver: compression (hki, cab, zip, gzip,
tar, jar...)
extract 14 formats (hki, rar, ace, zip, gzip, tar,
...)
Encryption / Decryption support
Full zip support ,own HKI format ,splitten and
spanning ,SFX Modul ,12 Languages
http://www.winhki.com
http://www.webtoolmaster.com
Credit:
The information has been provided by Hamid Ebadi
( Hamid Network Security Team) : admin@xxxxxxxxx
The original article can be found at :
http://hamid.ir/security
Vulnerable Systems:
WinHKI 1.6 and Below
Detail :
The vulnerability is caused due to an input validation
error when extracting files compressed with RAR (.rar)
or TAR (.tar) or ZIP (.zip) or TAR.GZ (tar.gz)
This makes it possible to have files extracted to
arbitrary locations outside the specified directory
using the "../" directory traversal sequence.
Solution:
resolved issue and fix will be available in next
release .
Do not extract untrusted RAR and TAR and ZIP and
TAR.GZ files.
To reduce the risk, never extract files as an
administrative user.
harmless exploit:
use HEAP [Hamid Evil Archive Pack]
you can download it from Hamid Network Security Team :
http://www.hamid.ir/tools/
want to know more ?
http://www.hamid.ir/paper
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com