TUCoPS :: Browsers :: va2206.htm

Google Chrome FTP PASV IP Malicious Port Scanning Vulnerability.
Google Chrome FTP PASV IP Malicious Port Scanning Vulnerability.
Google Chrome FTP PASV IP Malicious Port Scanning Vulnerability.

Advisory: Google Chrome FTP PASV IP Malicious Port Scanning Vulnerability.

Version Affected:
Google Chrome:

Google Chrome FTP Client is vulnerable to FTP PASV malicious port
scanning vulnerability. The username in the
FTP (ftp://username:password@domain.com) can be manipulated by tampering 
it with certain IP address with
specification of port as
(ftp://xxx.xxx.xxx.xxx-22:password@domain.com).The Google Chrome FTP 
client make
connection to the rogue FTP server which uses PASV commands to scan
network.Dynamic requests are issued to a
rogue FTP server which accepts connection with different usernames as
the IP address with specified ports to locate
the non existing object on the target domain.

Request 1 : ftp://xxx.xxx.xxx.xxx-21:password@domain.com 
Request 2 : ftp://xxx.xxx.xxx.xxx-22:password@domain.com 
Request 3 : ftp://xxx.xxx.xxx.xxx-23:password@domain.com 
Request 4 : ftp://xxx.xxx.xxx.xxx-25:password@domain.com 

JavaScript Port Scanning is used to exploit this issue. A malicious web
page hosted on a specially-coded FTP server
could use this feature to perform a generic port-scan of machines inside
the firewall of the victim.The generated
fraudulent request helps attacker to exhibit internal network
information through sustainable port scanning through

Proof of Concept:


SecNiche confirmed this vulnerability affects Google Chrome on Microsoft
Windows XP SP2 platform.
The versions tested are:


Disclosure Timeline:
Disclosed: 1 January 2009
Release Date. 4 January 2009

Vendor Response:
Google acknowledges this vulnerability by reproducing the issue. Views
have been exchanged over the
 severity level of this flaw.The chrome ID of this issue is 5978.

Aditya K Sood

The information in the advisory is believed to be accurate at the time
of publishing based on currently
available information. Use of the information constitutes acceptance for
use in an AS IS condition. There
is no representation or warranties, either express or implied by or with
respect to anything in this
document, and shall not be liable for a ny implied warranties of
merchantability or fitness for a particular
purpose or for any indirect special or consequential damages.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH