|
Name: Michael Gray
Website: www.ownerarium.net
Contact: moose@ownerarium.net
Discovered Exploit: 06-05-2008
Vulnerable Software Title: GSC
Vulnerable Version: <= 2067
Severity: CRITICAL
Website: http://www.getgsc.com
Reported to vendor: Yes
Actively exploited: Yes
Exploit Discovery
------------------
I was analyzing packets for an application of my own to figure out an
issue with my own protocol when I noticed I was receiving packets that
looked similar to that of IRC, so I decided to take a break from my own
project and figure out what application it was. I noticed it was the
voice communication and chat program called GSC. Since I was bored I
figured I would poke around at some of these packets.
First I logged on to my own channel as an administrator and kicked a
friend of mine from the chat channel while recording packets. After
capturing that packet I sent him an application to send raw packets over
a specific socket and told him to send that to the server while he did
not have administrator rights. Immediately after sending the packet he
was disconnected from the channel because he was kicked. We discovered
that the administration system's authentication is done completely
client side and the server only sends a message to the client saying if
the client has administrator rights to the channel, but the server
doesn't check these rights if any administrator command is received.
The Exploit
------------
1.) Log on to GSC with a valid user account
2.) Join your own channel
3.) Record packets that are sent/received to/from GSC
4.) Kick a kind friend from your channel
5.) Stop capturing packets
6.) Modify this packet to reflect who you want to kick
The packet for kicking a user looks something like this:
NOTICE