AOL Instant Messenger URL href Attribute Traversal Arbitrary Local File Execution

medium Nessus Network Monitor Plugin ID 1245

Synopsis

An attacker can execute local files on the remote AOL Client

Description

The remote host is running AOL Instant Messenger (AIM). AIM is prone to an issue that may allow attackers to execute arbitrary files on the client system. It is possible to send a malicious link that references local files to a user of the client. When the link is visited, the referenced file on the client's local filesystem will be executed. To exploit this issue, the attacker must know the exact location of the file to be executed. Additionally, there can be no spaces in the path or filename. This limits exploitability, since files must be on the same partition and command line arguments cannot be supplied. Versions other than AOL Instant Messenger 4.8.2790 do not seem to be affected by this vulnerability.

Solution

This issue reportedly only present in AOL Instant Messenger 4.8.2790. Users may address this issue by upgrading or downgrading to another version.

Plugin Details

Severity: Medium

ID: 1245

Published: 8/20/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:H/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:aol:aim

Reference Information

CVE: CVE-2002-1813

BID: 6027