<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; exploit</title>
	<atom:link href="http://torrentfreak.com/tag/exploit/feed/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 19:18:38 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>TorrentTrader Classic Vulnerable to IP Authorization Bypass</title>
		<link>http://torrentfreak.com/torrenttrader-classic-vulnerable-to-authorization-bypass-080608/</link>
		<comments>http://torrentfreak.com/torrenttrader-classic-vulnerable-to-authorization-bypass-080608/#comments</comments>
		<pubDate>Sun, 08 Jun 2008 16:17:59 +0000</pubDate>
		<dc:creator><![CDATA[enigmax]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[TorrentTrader]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=2843</guid>
		<description><![CDATA[A security researcher has found a vulnerability in the TorrentTrader tracker software which can be exploited to leak the contents of a site's IP database. This database can then be used to gain unauthorized access to a site's tracker. The vendor has been informed and a fix is available.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Security researcher Charles Vaughn graduated with a software engineering degree from University of Texas at Arlington, and he now &#8216;pays his bills&#8217; with general Unix application server stuff. Recently, Vaughn decided to take a look at the frequently used BitTorrent tracker TorrentTrader.</p>
<p>&#8220;My passion is security, and I decided to get my hands dirty by auditing a code base. I picked Torrent Trader because it powers a website I use day to day, and the source is freely available,&#8221; Charles told us. </p>
<p>His efforts weren&#8217;t in vain, as Vaughn has <a href="http://www.securityfocus.com/archive/1/492878/30/0/threaded">found</a> a significant vulnerability in the TorrentTrader <a href="http://sourceforge.net/projects/torrenttrader">Classic</a>, which makes it possible for outsiders to see what files are traded, and by whom. </p>
<p>Written in PHP, TorrentTrader requires users to log in to download a torrent. At this point the IP address of the user is logged and only that IP may be used by the user to join the swarm. Charles has discovered that by exploiting a SQL injection hole in scrape.php, it is possible to get a list of all IPs in a torrent site&#8217;s database.</p>
<p>&#8220;It took me about a day to identify the scrape.php issue.  This was done by searching through the code base for mysql calls, then backtracking any variables to see if they were used in an unsafe manner,&#8221; Vaughn said.</p>
<p>For the technically minded, Charles explains how the exploit works: &#8220;Scrape.php responds to scrape requests from the BitTorrent clients.  It can generate two different responses.  If called directly it will list all torrents and their status on the tracker.  If called with a specific torrent hash, it will return the status for that torrent.&#8221;</p>
<p>&#8220;The problem is that TorrentTrader didn&#8217;t sanitize the input, and only checked to make sure that it was exactly 40 characters. The input was then passed directly to a database query. By putting in additional SQL in the info hash, and making sure it was 40 characters, it was possible to gain access to certain parts of the database.&#8221;</p>
<p>&#8220;Perhaps the biggest implication for this attack is that an outsider can view the IP addresses of who is using the tracker and which peers are sharing which files,&#8221; Vaugn concludes.</p>
<p>Tracker administrators can close the hole by replacing their scrape.php with the one found in the v1.08 release. Better safe than sorry.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/torrenttrader-classic-vulnerable-to-authorization-bypass-080608/feed/</wfw:commentRss>
		<slash:comments>11</slash:comments>
		</item>
		<item>
		<title>Private BitTorrent Trackers Under Threat From Major Exploit</title>
		<link>http://torrentfreak.com/private-bittorrent-trackers-under-threat-from-major-exploit-080418/</link>
		<comments>http://torrentfreak.com/private-bittorrent-trackers-under-threat-from-major-exploit-080418/#comments</comments>
		<pubDate>Fri, 18 Apr 2008 18:19:35 +0000</pubDate>
		<dc:creator><![CDATA[enigmax]]></dc:creator>
				<category><![CDATA[DRM and Other Evil]]></category>
		<category><![CDATA[Torrent Sites]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[private-tracker]]></category>
		<category><![CDATA[tbdev]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/private-bittorrent-trackers-under-threat-from-major-exploit-080418/</guid>
		<description><![CDATA[Thousands of private BitTorrent trackers using the popular TBDev code are vulnerable to hostile takeover. According to a security researcher, a successful execution of the exploit could result in the attacker gaining admin rights to the tracker. However, knowledge and a little care can mitigate the effects.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>The popular TBDev code on which thousands of private BitTorrent trackers are built, is said to be vulnerable to a major exploit. A successful attack could allow a malicious attacker to deface the main tracker page (index.php) and hijack the account of anyone who logs into the application. Worryingly it&#8217;s even possible to hijack an administrator&#8217;s account by using a social engineering attack to get them to click on specially crafted hyperlink, although most admins won&#8217;t be tricked by this method.</p>
<p>According to Michael Brooks, a security researcher who brought this issue to our attention, this particular TBDev exploit is down to the fact the developers didn&#8217;t protect the administrative interface from Cross Site Scripting attacks (<a href="http://www.owasp.org/index.php/Cross_Site_Scripting">XSS</a>).</p>
<p>The attack uses <a href="http://www.owasp.org/index.php/Cross-Site_Request_Forgery">CSRF</a> in a chain with other flaws to obtain synergy &#8211; Michael calls this CSRF Bouncing.</p>
<p>&#8220;Unfortunately this Cross Site Scripting attack is accessible by an attacker using a Cross Site Request Forgery&#8221; Michael told TorrentFreak. &#8220;The Cross Site Scripting flaw is particularly valuable. The XSS payload is stored in the main index.php for the application. This means that an attacker can expose every visitor to their payload.&#8221; </p>
<p>Michael goes on: &#8220;The CSRF flaw is POST based so it does require the administrator to execute javascript. Finding the administrator account isn&#8217;t difficult if you have a user account on the system. Like with just about every SQL powered application the administrator is the first user account created. From this profile you will be able to send a personal message and you may even be able to obtain the admin&#8217;s email address.&#8221;</p>
<p>Worryingly, even if the attacker doesn&#8217;t have a user account, it&#8217;s possible to get one using an XSS flaw.</p>
<p>Michael explained how a malicious attacker increases his chances of a success with the exploit, by combining it with a little social engineering.</p>
<p>&#8220;In this case I am using the reflective XSS flaw to make it appear as though the administrator is viewing his own web application. The social engineering attack could look something like this: &#8216;I think there is a bug in your site. Can you check this link, it just does not look right http://localhost/redir.php?url=&#8217; . This now means the flaw is no longer a &#8220;Cross Site&#8221; Request Forgery, because the request is being sent from the same website.&#8221;</p>
<p>After a successful attack it&#8217;s possible to deface the site and &#8220;hijack every user&#8217;s authentication token indefinitely&#8221;.</p>
<p>So what can be done to avoid this exploit? Michael told TorrentFreak:</p>
<p>&#8220;The most important thing to keep in mind is do not click on links that look like this. The link can be easily modified to be shorter, but the important part is avoiding links to TBDev&#8217;s /redir.php.&#8221;</p>
<p><img src="http://torrentfreak.com//images/exploit.jpg" alt="exploit"></p>
<p>&#8220;However this isn&#8217;t the only way that the flaw can be exploited.  If you visit a website that the hacker controls then he can also trigger the attack.   If you think you might have clicked on a bad link, change your password immediately.&#8221;</p>
<p>So what should an admin do if they already fell victim to the exploit?</p>
<p>&#8220;To remove the persistent XSS payload the administrator might have to login to the SQL server manually and delete the offending entry in the &#8220;news&#8221; table (since they won&#8217;t be able to use the web application to delete the news posting) using DELETE FROM news WHERE body LIKE &#8216;%fromCharCode%&#8217;.</p>
<p>The difficult part is that every user will have to change their password. In PHP I suggest defending against XSS using htmlspecialchars($var,ENT_QUOTES); . There are cases where XSS can still be possible without ENT_QUOTES. To defend against CSRF i suggest using <a href="http://www.owasp.org/index.php/PHP_CSRF_Guard">PHP CSRF Guard</a>.&#8221;</p>
<p>An administrator on a TBDev tracker we spoke with suggested a very quick fix off the top of his head:</p>
<blockquote><p>in news.php change</p>
<p>$body = $_POST["body"];</p>
<p>to</p>
<p>$body = htmlspecialchars($_POST["body"],ENT_QUOTES);</p></blockquote>
<p>We put this to Michael who told us: &#8220;The fix isn&#8217;t bad however the same fix also needs to be applied to $_GET["url"]  in redir.php or the administrator account as well as others are subjected to hijack. There are other security problems with this application,  but the XSS is the most serious as it leads to immediate attack.&#8221;</p>
<p>Earlier today TorrentFreak contacted a number of admins with details of the exploit. Michael tells us he has notified the relevant people of the flaw but it may take a few days until an official patch is made available. </p>
<p>The full details of the exploit are available <a href="http://www.rooksecurity.com/blog/?p=8">here</a>.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/private-bittorrent-trackers-under-threat-from-major-exploit-080418/feed/</wfw:commentRss>
		<slash:comments>62</slash:comments>
		</item>
		<item>
		<title>uTorrent Vulnerable to Remote Exploits</title>
		<link>http://torrentfreak.com/utorrent-vulnerable-to-remote-exploits/</link>
		<comments>http://torrentfreak.com/utorrent-vulnerable-to-remote-exploits/#comments</comments>
		<pubDate>Tue, 13 Feb 2007 12:20:41 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[DRM and Other Evil]]></category>
		<category><![CDATA[Hot Off The Press]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[utorrent]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/utorrent-vulnerable-to-remote-exploits/</guid>
		<description><![CDATA[The popular BitTorrent client uTorrent is reported to be vulnerable to remote exploits. Such exploits allow hackers to gain remote access to, and control over your computer.
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://www.torrentfreak.com/images/utorrent.png" align="right" alt="utorrent exploit">Two weeks ago, <a href="http://blogs.zdnet.com/Ou/?p=416">George Ou</a> discovered that Vista&#8217;s Speech Recognition exposes the possibility of a remote exploit, but it seems that uTorrent is not perfect either. </p>
<p>uTorrent is vulnerable to remote exploits (<a href="http://www.milw0rm.com/exploits/3296">example</a>) if the announce field of the .torrent file exceeds 4800 Bytes. This causes a buffer-overflow, and allow hackers to run their exploits. Note that these announce fields are normally smaller, so you have to be tricked into downloading a malicious torrent first.</p>
<p>The exploit is found in uTorrent 1.6 (build 474), but might affect older versions as well. It is <a href="http://forum.utorrent.com/viewtopic.php?id=19775">reported</a> that the exploit works on Windows 2000, and both Windows XP Service Pack 1 and 2. </p>
<p>The good news is that these exploits are only triggered by .torrent files that are designed to exploit uTorrent. This means that people are relatively safe if they watch out where they download their torrents from.</p>
<p>Update: This vulnerability has been fixed in the <a href="http://download.utorrent.com/beta/utorrent-1.6.1-beta-build-483.exe">latest beta</a>. </p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/utorrent-vulnerable-to-remote-exploits/feed/</wfw:commentRss>
		<slash:comments>13</slash:comments>
		</item>
	</channel>
</rss>
