PwnSpeak a 0day Exploit for TeamSpeak Client <= 3.0.18.1 RFI to RCE
The bug is a simple but Critical RFI(Remote File Inclusion), and in my test case on 'Windows' you can reach remote code execution. By changing the channel description you can insert a [img] bb tag with malicious content. There are a few problems with the image caching on disk. 1: There is no check on file extension. 2: There is no file renaming, and you can fake the extension so you can create in the cache a malicious executable file like hta, scr, msi, pif, vbs etc. 3: Teamspeak 3 Client saves the image and recreates the same directory structure as the server where it's hosted. 4: It is possible to do a Directory Traversal with a simple urlencode of the traversal path bypassing the built-in control.