Security restrictions bypass in uTorrent - #VU10676
Published: February 21, 2018
Vulnerability identifier: #VU10676
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: utorrent.com
Affected software:
uTorrent
uTorrent
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass security restriction on the target system.
The weakness exists due to perform DNS rebinding attack, host JavaScript code on a website to create a bridge to the local network, bypass the same-origin policy (SOP), change the download directory to the Startup folder in Windows and download an executable file to any writable location, which would run on every startup.
The weakness exists due to perform DNS rebinding attack, host JavaScript code on a website to create a bridge to the local network, bypass the same-origin policy (SOP), change the download directory to the Startup folder in Windows and download an executable file to any writable location, which would run on every startup.
Remediation
The vendor has issued an incomplete security fix for the vulnerability.