Fortinet Discovers QIWI Monitoring Terminal DLL Preloading Vulnerability
Fortinet's FortiGuard Labs has discovered a DLL preloading vulnerability in QIWI Monitoring Terminal.
The QIWI Monitoring Terminal program is designed to monitor the status of self-service automata. This program has several advantages over monitoring through Internet and using a mobile phone such as, the ability to simultaneously view information on machines belonging to different subagents, ability to customize the appearance of the program, the ability to create your own conditions (filters) to display the monitoring information, as well as the use of several filters simultaneously, etc.
QIWI Monitoring Terminal for Windows is susceptible to a DLL preloading vulnerability. The issue occurs when the application looks to load a DLL for execution and an attacker provides a malicious DLL to use instead. The application generally follows a specific search path to locate the DLL. The vulnerability can be exploited by a simple file write (or potentially an over-write) which results in a foreign DLL running under the context of the application.
No vendor patch is available.
Fortinet reported the vulnerability to Qiwi on July 18, 2017.
Qiwi confirmed the vulnerability on July 19, 2017.
This vulnerability was discovered by Kushal Arvind Shah of Fortinet's FortiGuard Labs.