AVAST Universal Core Installer - Multiple Vulnerabilities
Common Vulnerability Scoring System:
Avast! (styled avast!) is - both freeware and payable - an antivirus computer program with user interface that includes
41 languages, available to Microsoft Windows, Mac OS X and Linux users. The name Avast is an acronym of `Anti-Virus
– Advanced Set`.
The official, and current logo of Avast! is a white orb with the letter `a` on it and an orange circle around it,
sticking out to
four directions.Its developer, AVAST Software a.s. (formerly known as ALWIL Software a.s.), has headquartered in Prague,
Republic, with offices in Linz, Austria; Friedrichshafen, Germany; and San Mateo, California.
It has been awarded VB100 Award by Virus Bulletin multiple times for 100% detection of `in-the-wild` viruses, and also
won the Secure Computing Readers`Trust Award. The central scanning engine has been certified by ICSA Labs and West Coast
Checkmark process.Avast! competes in the antivirus industry against Avira, AVG Technologies, Bitdefender, F-Secure,
McAfee, Symantec and Trend Micro among others.
(Copy of the Homepage: http://en.wikipedia.org/wiki/Avast! )
The Vulnerability Laboratory Research Team discovered a persistent code injection and local command path injection
vulnerability in the AVAST Universal Core Installer application software.
2013-06-06: Researcher Notification & Coordination (Ateeq Khan)
2013-06-07: Vendor Notification (AVAST! - Security Incident Team)
2013-06-09: Vendor Response/Feedback (AVAST! - Security Incident Team)
2013-**-**: Vendor Fix/Patch (AVAST! - Developer Team)
2013-06-28: Public Disclosure (Vulnerability Laboratory)
It has been discovered that the Core avast installer application is vulnerable to persistent code injection and local
command path injection vulnerability. During the testing, I was able to succesfully read/load and execute any
from local system having the local admin priviledges which makes this bug alot more interesting.
Initially the bug was an HTML code injection flaw only however, with more indepth analysis, it was revealed that the
severity of this vulnerability is far more differnt. A simple tag bypasses the AVAST Sandbox and drops a
shell on the system where AVAST is installed. You can technically access any file / application, execute it. It seems
can control explorer.exe and through that we are even able to browse local folders and access any file, we can even
The bug exists in the Custom Install Section under Destination Field. Since proper input sanatization is not being
performed, a user can insert any HTML code which then gets executed successfully. For a POC i used the and
read/load and execute files from my local system. I believe there may be possibilities of multiple attack vectors
keeping in mind
of this vulnerability.
During the POC, I was able to successfully bypass the AVAST sandbox and I was able to run local system level commands
using the AVAST Interface.
These sort of vulnerabilities can result in multiple attack vectors on the clients end which may eventually result in
complete compromise of
the end user system.
Exploitation of this vulnerability requires a low or medium user interaction. Successful exploitation of the
vulnerability may result
in malicious script code being executed resulting in local command/shell injection, persistent phishing, Client side
similar dangerous attacks.
[+] avast Premier Antivirus Installer - Latest Release
[+] avast Antivirus Pro Installer - Latest Release
[+] avast Free Antivirus Installer Version 8 - Latest Release
[+] avast Internet Security Suite Installer - Latest Release
[+] Custom Install
[+] Enter the Destination Directory
Proof of Concept:
The vulnerabilities can be exploited by local attackers with low system privilege account and low user interaction.
For demonstration or reproduce ...
a) Run the avast Premier Installer binary file (avast_premier_antivirus_setup.exe)
b) Click on Custom Install
c) under the field "Enter the Destination directory" enter the following Payload
C:Program FilesAVAST SoftwareAvast