#VU10676 Security restrictions bypass in uTorrent
Published: February 21, 2018
Vulnerability identifier: #VU10676
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
uTorrent
uTorrent
Software vendor:
utorrent.com
utorrent.com
Description
The vulnerability allows a remote attacker to bypass security restriction on the target system.
The weakness exists due to perform DNS rebinding attack, host JavaScript code on a website to create a bridge to the local network, bypass the same-origin policy (SOP), change the download directory to the Startup folder in Windows and download an executable file to any writable location, which would run on every startup.
The weakness exists due to perform DNS rebinding attack, host JavaScript code on a website to create a bridge to the local network, bypass the same-origin policy (SOP), change the download directory to the Startup folder in Windows and download an executable file to any writable location, which would run on every startup.
Remediation
The vendor has issued an incomplete security fix for the vulnerability.