#VU10676 Security restrictions bypass in uTorrent

 

#VU10676 Security restrictions bypass in uTorrent

Published: February 21, 2018


Vulnerability identifier: #VU10676
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
uTorrent
Software vendor:
utorrent.com

Description

The vulnerability allows a remote attacker to bypass security restriction on the target system.

The weakness exists due to perform DNS rebinding attack, host JavaScript code on a website to create a bridge to the local network, bypass the same-origin policy (SOP), change the download directory to the Startup folder in Windows and download an executable file to any writable location, which would run on every startup.

Remediation

The vendor has issued an incomplete security fix for the vulnerability.

External links