[FD] SHAREit for Android Authentication Bypass and Remote File Download
RedForce Advisory https://redforce.io ## ِAdvisory Information Title: SHAREit For Android <= 4.0.38 Multiple Vulnerabilities Advisory URL: https://blog.redforce.io/shareit-vulnerabilities-enable-unrestricted-access-to-adjacent-devices-files/ Date published: 2019-02-25 Date of last update: 2019-02-25 Vendors contacted: Beijing Shareit Information Technology Co., Ltd. ## Introduction SHAREit for Android is a popular application used for file transfer among cross-platform devices using WiFi. It is considered one of the most popular Android applications with over 500 million downloads (+950M downloads according to [AndroidRank database] (https://www.androidrank.org/application/shareit_transfer_share/com.lenovo.anyshare.gps?hl=en) ) . ## Vulnerability Description SHAREit for Android <= 4.0.38 was found to be prone to multiple high severity vulnerabilities that enable a remote attacker -on the same network or joining public "open" WiFi hotspots created by the application when file transfer is initiated- to download arbitrary files from user's device including contacts, photos, videos, sound clips...etc. Full vulnerability technical details can be found in our advisory ( https://blog.redforce.io/shareit-vulnerabilities-enable-unrestricted-access-to-adjacent-devices-files/ ) ## Proof of Concept ### Quick Demo https://www.youtube.com/watch?v=Q4kk4FvrH6g ### Full Length Proof of Concept (GUI and AutoPwn modules) https://www.youtube.com/watch?v=xzoJXBCznWc ### Exploit Code (dubbed DUMPit) https://github.com/redforcesec/DUMPit/ ## Credits These vulnerabilities were discovered and researched by Abdulrahman Nour from RedForce. ## About RedForce RedForce is an information security consultancy firm consists of a team of experts in the offensive security field. By using the latest techniques, methodologies and attack simulation from an adversary prospective, we make sure that your organization is approaching the best practice to mitigate the risk at the lowest cost. We approach our offensive services from a holistic approach. Our aim is to contribute to the efforts of our customers in securing the critical IT infrastructure and crown jewels within their IT landscape. For more information, please visit https://redforce.io ___ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
[FD] Deskpro Helpdesk < 2019.8.0 (Privilege Escalation, RCE)
RedForce Advisory https://redforce.io ## ِAdvisory Information Title: Deskpro Helpdesk < 2019.8.0 Multiple Vulnerabilities Advisory URL: https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro-with-bitdefender-as-case-study/ Date published: 2020-03-28 Date of last update: 2020-03-30 Vendors contacted: DeskPro ## About Deskpro Deskpro is a helpdesk software solution that helps companies manage their communication with their customers and user base across a multiple channels; email, live chat, voice, social media. DeskPro has clients in different industries. Some of the well-known names per their website are: Microsoft, Siemens, P&G, Vodafone, HMRC, CapitalOne, Panasonic, NHS, Valve, Brown University, Hotel Chocolat, Garmin, Team USA, Arrow, Pure, Xerox, 1&1, Booz Allen Hamilton, Bitdefender, US Department of Defense and more. ## Vulnerability Description Deskpro on-premise helpdesk solution < 2019.8.0 was found to be prone to multiple high severity vulnerabilities that enable a remote attacker to escalate their privilege to helpdesk administrator. Moreover, it was prone to remote code execution (RCE) leading to full compromise of the server. Full vulnerability technical details and exploitation steps can be found in our advisory ( https://blog.redforce.io/attacking-helpdesks-part-1-rce-chain-on-deskpro-with-bitdefender-as-case-study/ ) ## Credits These vulnerabilities were discovered and researched by Abdulrahman Nour from RedForce. ## About RedForce RedForce is an information security consultancy firm consists of a team of experts in the offensive security field. By using the latest techniques, methodologies and attack simulation from an adversary prospective, we make sure that your organization is approaching the best practice to mitigate the risk at the lowest cost. We approach our offensive services from a holistic approach. Our aim is to contribute to the efforts of our customers in securing the critical IT infrastructure and crown jewels within their IT landscape. For more information, please visit https://redforce.io ___ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/