{"href": "http://www.vulnerability-lab.com/get_content.php?id=1963", "sourceData": "Document Title:\r\n===============\r\nZortam MP3 Studio v21.15 - Insecure File Permissions\r\n\r\n\r\nReferences (Source):\r\n====================\r\nhttps://www.vulnerability-lab.com/get_content.php?id=1963\r\n\r\n\r\nRelease Date:\r\n=============\r\n2016-09-29\r\n\r\n\r\nVulnerability Laboratory ID (VL-ID):\r\n====================================\r\n1963\r\n\r\n\r\nCommon Vulnerability Scoring System:\r\n====================================\r\n5.4\r\n\r\n\r\nProduct & Service Introduction:\r\n===============================\r\nZortam Mp3 Media Studio is a great all-in-one music tool for organizing your Mp3/Karaoke collection for editing Mp3 ID3 tags, \r\nripping your CD, normalizing Mp3, converts Mp3/Wav and Wav/Mp3, to get song lyric and cover arts from the internet and \r\nkeeping your music collection well organized.\r\n\r\n(Copy of the Vendor Homepage: http://www.zortam.com/ )\r\n\r\n\r\n\r\nAbstract Advisory Information:\r\n==============================\r\nAn independent vulnerability laboratory researcher discovered an insecure file permission vulnerability in the Zortam MP3 Studio v21.15 software.\r\n\r\n\r\nVulnerability Disclosure Timeline:\r\n==================================\r\n2016-09-29:\tPublic Disclosure (Vulnerability Laboratory)\r\n\r\n\r\nDiscovery Status:\r\n=================\r\nPublished\r\n\r\n\r\nAffected Product(s):\r\n====================\r\nZortam \r\nProduct: Zortam MP3 Studio - Software 21.15\r\n\r\n\r\nExploitation Technique:\r\n=======================\r\nLocal\r\n\r\n\r\nSeverity Level:\r\n===============\r\nMedium\r\n\r\n\r\nTechnical Details & Description:\r\n================================\r\nInsecure File Permissions vulnerability has been discovered in the official Zortam MP3 Studio v21.15 software.\r\nThe vulnerability exists due to insecure default permissions set on the zPlayer.exe. \r\n\r\nA local attacker could exploit this vulnerability by replacing zPlayer.exe with a malicious executable file. \r\nThe malicious file could execute with the local system user permissions. \r\n\r\n\r\n\r\nProof of Concept (PoC):\r\n=======================\r\nZortam MP3 Studio for windows contains a vulnerability that could allow a local attacker to gain elevated privileges.\r\nFor security demonstration or to reproduce the vulnerability follow the provided information and steps below.\r\n\r\n\r\n-- PoC Exploitation --\r\nC:Program FilesZortam Mp3 Media Studio>cacls zPlayer.exe\r\nC:Program FilesZortam Mp3 Media StudiozPlayer.exe BUILTINUtilisateurs:F\r\n\r\nAUTORITE NTSyst\u00e8me:(ID)F\r\nBUILTINAdministrateurs:(ID)F\r\nBUILTINUtilisateurs:(ID)R\r\nAUTORIT\u00c9 DE PACKAGE D'APPLICATIONTOUS LES PACKAGES D'APPLICATION:(ID)R\r\n\r\n\r\nSecurity Risk:\r\n==============\r\nThe security risk of the local insecure file permission issue in the software core is estimated as medium. (CVSS 5.4)\r\n\r\n\r\nCredits & Authors:\r\n==================\r\nZwX - ( http://zwx.fr ) [ http://www.vulnerability-lab.com/show.php?user=ZwX ]\r\n\r\n\r\nDisclaimer & Information:\r\n=========================\r\nThe information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed \r\nor implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable \r\nin any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab \r\nor its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability mainly for \r\nconsequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any licenses, policies, \r\ndeface websites, hack into databases or trade with stolen data.\r\n\r\nDomains: www.vulnerability-lab.com \t\t- www.vuln-lab.com \t\t\t\t\t\t- www.evolution-sec.com\r\nSection: magazine.vulnerability-lab.com \t- vulnerability-lab.com/contact.php \t\t\t\t- evolution-sec.com/contact\r\nSocial:\t twitter.com/vuln_lab\t\t- facebook.com/VulnerabilityLab \t\t\t\t- youtube.com/user/vulnerability0lab\r\nFeeds:\t vulnerability-lab.com/rss/rss.php \t- vulnerability-lab.com/rss/rss_upcoming.php \t\t\t- vulnerability-lab.com/rss/rss_news.php\r\nPrograms: vulnerability-lab.com/submit.php \t- vulnerability-lab.com/list-of-bug-bounty-programs.php \t- vulnerability-lab.com/register.php\r\n\r\nAny modified copy or reproduction, including partially usages, of this file, resources or information requires authorization from Vulnerability Laboratory. \r\nPermission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by \r\nVulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark \r\nof vulnerability-lab team & the specific authors or managers. To record, list, modify, use or edit our material contact (admin@) to get a ask permission.\r\n\r\n\t\t\t\t Copyright \u00a9 2016 | Vulnerability Laboratory - [Evolution Security GmbH]\u2122\r\n\r\n\r\n\r\n", "bulletinFamily": "exploit", "modified": "2016-09-29T00:00:00", "title": "Zortam MP3 Studio v21.15 - Insecure File Permissions", "cvss": {"vector": "NONE", "score": 0.0}, "cvelist": [], "description": "", "viewCount": 4, "published": "2016-09-29T00:00:00", "edition": 3, "id": "VULNERLAB:1963", "type": "vulnerlab", "lastseen": "2019-07-10T16:42:10", "reporter": "ZwX - ( http://zwx.fr ) [ http://www.vulnerability-lab.com/show.php?user=ZwX ]", "enchantments": {"dependencies": {"references": [], "modified": "2019-07-10T16:42:10", "rev": 2}, "score": {"value": -0.7, "vector": "NONE", "modified": "2019-07-10T16:42:10", "rev": 2}, "vulnersScore": -0.7}, "references": [], "scheme": null, "immutableFields": []}