Google Chrome: 18.104.22.168
Google Chrome FTP Client is vulnerable to FTP PASV malicious port scanning vulnerability.The username in the FTP (ftp://username:[email protected]) can be manipulated by tampering it with certain IP address with specification of port as (ftp://xxx.xxx.xxx.xxx-22:[email protected]).The Google Chrome FTP client make connection to the rogue FTP server which uses PASV commands to scan network.Dynamic requests are issued to a rogue FTP server which accepts connection with different usernames as the IP address with specified ports to locate the non existing object on the target domain.
Request 1 : ftp://xxx.xxx.xxx.xxx-21:[email protected]
Request 2 : ftp://xxx.xxx.xxx.xxx-22:[email protected]
Request 3 : ftp://xxx.xxx.xxx.xxx-23:[email protected]
Request 4 : ftp://xxx.xxx.xxx.xxx-25:[email protected]
Proof of Concept:
SecNiche confirmed this vulnerability affects Google Chrome on Microsoft Windows XP SP2 platform.The versions tested are:
Disclosed: 1 January 2009
Release Date. 4 January 2009
Google acknowledges this vulnerability by reproducing the issue. Views have been exchanged over the severity level of this flaw.The chrome ID of this issue is 5978.
Aditya K Sood
The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There is no representation or warranties, either express or implied by or with respect to anything in this document, and shall not be liable for a ny implied warranties of merchantability or fitness for a particular purpose or for any indirect special or consequential damages.