Vulnerabilities > CVE-2013-2773 - Untrusted Search Path vulnerability in Gonitro Nitropdf 8.5.0.26

047910
CVSS 7.8 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
local
low complexity
gonitro
CWE-426
nessus

Summary

Nitro PDF 8.5.0.26: A specially crafted DLL file can facilitate Arbitrary Code Execution

Vulnerable Configurations

Part Description Count
Application
Gonitro
1

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Leveraging/Manipulating Configuration File Search Paths
    This attack loads a malicious resource into a program's standard path used to bootstrap and/or provide contextual information for a program like a path variable or classpath. J2EE applications and other component based applications that are built from multiple binaries can have very long list of dependencies to execute. If one of these libraries and/or references is controllable by the attacker then application controls can be circumvented by the attacker. A standard UNIX path looks similar to this If the attacker modifies the path variable to point to a locale that includes malicious resources then the user unwittingly can execute commands on the attackers' behalf: This is a form of usurping control of the program and the attack can be done on the classpath, database resources, or any other resources built from compound parts. At runtime detection and blocking of this attack is nearly impossible, because the configuration allows execution.

Nessus

NASL familyWindows
NASL idNITRO_PRO_8_5_2_10.NASL
descriptionThe version of Nitro Pro installed on the remote Windows host is earlier than 8.5.2.10 and is, therefore, reportedly affected by an insecure library loading vulnerability. By tricking a user into opening a specially crafted file, an attacker could execute arbitrary code on the remote host subject to the privileges of the user running the affected application.
last seen2020-06-01
modified2020-06-02
plugin id66026
published2013-04-18
reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/66026
titleNitro Pro Insecure Library Loading
code
#
# (C) Tenable network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(66026);
  script_version("1.5");
  script_cvs_date("Date: 2018/11/15 20:50:27");

  script_cve_id("CVE-2013-2773");
  script_bugtraq_id(58928);

  script_name(english:"Nitro Pro Insecure Library Loading");
  script_summary(english:"Checks version of Nitro Pro");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has a PDF toolkit installed that is affected by an
insecure library loading vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of Nitro Pro installed on the remote Windows host is
earlier than 8.5.2.10 and is, therefore, reportedly affected by an
insecure library loading vulnerability.  By tricking a user into opening
a specially crafted file, an attacker could execute arbitrary code on
the remote host subject to the privileges of the user running the
affected application.");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2013/Apr/60");
  script_set_attribute(attribute:"solution", value:"Upgrade to Nitro Pro 8.5.2.10 or later.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/04/08");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/03/28");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/04/18");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:nitro:nitro_pdf");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");

  script_dependencies("nitro_pro_installed.nasl");
  script_require_keys("SMB/Nitro Pro/installed");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

info = '';
info2 = '';
vuln = 0;
installs = get_kb_list("SMB/Nitro Pro/*/Path");
if (isnull(installs)) audit(AUDIT_KB_MISSING, 'SMB/Nitro Pro/*/Path');

vuln = 0;
foreach install (keys(installs))
{
  path = installs[install];
  version = install - 'SMB/Nitro Pro/' - '/Path';

  if (ver_compare(ver:version, fix:'8.5.2.10', strict:FALSE) < 0)
  {
    info +=
      '\n  Path              : ' + path +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : 8.5.2.10\n';
    vuln++;
  }
  else
    info2 += ' and ' + version;
}

if (vuln)
{
  port = get_kb_item("SMB/transport");
  if (!port) port = 445;

  if (report_verbosity > 0)
  {
    if (vuln > 1) s = "s of Nitro Pro are";
    else s = " of Nitro Pro is";

    report =
      '\nThe following vulnerable instance' + s + ' installed on the' +
      '\nremote host :\n'+
      info;
    security_warning(port:port, extra:report);
  }
  else security_warning(port);

  exit(0);
}

if (info2)
{
  info2 -= ' and ';
  if (' and ' >< info2) be = 'are';
  else be = 'is';

  exit(0, 'The host is not affected since Nitro Pro '+info2+' '+be+' installed.');
}
else exit(1, 'Unexpected error -  \'info2\' is empty.');

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/121179/SA-20130408-0.txt
idPACKETSTORM:121179
last seen2016-12-05
published2013-04-09
reporterM. Heinzl
sourcehttps://packetstormsecurity.com/files/121179/Nitro-Pro-8-Insecure-Library-Loading.html
titleNitro Pro 8 Insecure Library Loading