Vulnerability identifier: #VU10676
Vulnerability risk: Low
CVSSv3.1: 9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
uTorrent
Client/Desktop applications /
Other client software
Vendor: utorrent.com
Description
The vulnerability allows a remote attacker to bypass security restriction on the target system.
The weakness exists due to perform DNS rebinding attack, host JavaScript code on a website to
create a bridge to the local network, bypass the same-origin policy
(SOP), change the download directory to the Startup folder in Windows
and download an executable file to any writable location, which would
run on every startup.
Mitigation
The vendor has issued an incomplete security fix for the vulnerability.
Vulnerable software versions
uTorrent: 3.0 - 3.4.2
External links
http://bugs.chromium.org/p/project-zero/issues/detail?id=1524
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.