CVE-2020-13661
📋 TL;DR
This vulnerability in Telerik Fiddler allows attackers to execute arbitrary programs on a victim's system by tricking them into using the 'Open On Browser' option with a specially crafted hostname containing a trailing space and command injection arguments. Users of Fiddler versions through 5.0.20202.18177 are affected.
💻 Affected Systems
- Telerik Fiddler
📦 What is this software?
Fiddler by Telerik
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker executing arbitrary malicious programs with the victim's privileges, potentially leading to data theft, ransomware deployment, or complete system takeover.
Likely Case
Limited program execution based on what the attacker can trick the user into running, potentially leading to malware installation or credential harvesting.
If Mitigated
No impact if users avoid the 'Open On Browser' option with untrusted hostnames or if proper application allowlisting is enforced.
🎯 Exploit Status
Exploitation requires user interaction but the technique is simple and publicly documented. The victim must click 'Open On Browser' on a malicious hostname.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.0.20204
Vendor Advisory: https://www.telerik.com/support/whats-new/fiddler/release-history/fiddler-v5.0.20204
Restart Required: Yes
Instructions:
1. Download Fiddler v5.0.20204 or later from Telerik website. 2. Run the installer. 3. Follow installation prompts. 4. Restart Fiddler after installation completes.
🔧 Temporary Workarounds
Disable 'Open On Browser' functionality
windowsPrevent users from using the vulnerable 'Open On Browser' option
User awareness training
allTrain users to avoid using 'Open On Browser' on untrusted or suspicious hostnames
🧯 If You Can't Patch
- Implement application allowlisting to prevent execution of unauthorized programs
- Restrict Fiddler usage to trusted networks and users only
🔍 How to Verify
Check if Vulnerable:
Check Fiddler version in Help > About. If version is 5.0.20202.18177 or earlier, you are vulnerable.
Check Version:
In Fiddler: Help > About
Verify Fix Applied:
Verify version is 5.0.20204 or later in Help > About. Test that 'Open On Browser' no longer executes arbitrary commands.
📡 Detection & Monitoring
Log Indicators:
- Process execution events from Fiddler.exe with unusual command-line arguments containing '--utility-and-browser --utility-cmd-prefix='
Network Indicators:
- HTTP requests to hostnames containing trailing spaces followed by command injection patterns
SIEM Query:
Process Creation where Image contains 'fiddler.exe' and CommandLine contains '--utility-and-browser --utility-cmd-prefix='
🔗 References
- https://www.nagenrauft-consulting.com/blog/
- https://www.telerik.com/support/whats-new/fiddler/release-history/fiddler-v5.0.20204
- https://www.telerik.com/support/whats-new/release-history
- https://www.nagenrauft-consulting.com/blog/
- https://www.telerik.com/support/whats-new/fiddler/release-history/fiddler-v5.0.20204
- https://www.telerik.com/support/whats-new/release-history