MyGetright accepts custom 'skins' from remote websites. A *.dld file is used to
specify paths to various resources, including graphics, file permissions, etc.
If the maliciously-composed *.dld file lists pathnames which contain long
sequences of extraneous data, the programs skin data can be mis-parsed, causing
the programs user interface to freeze while the program itself continues to
operate. *.dld files can specify download paths via a field called filepath.
If a file is specified for download, and the file already exists on the users
system, the frozen UI will fail to notify the user, and the file will be
overwritten without user prompting or confirmation. If this field contains
values including /../ sequences, the filepath specified can extend beyond the
normal directory structure used by My Getright, to the entire filesystem. As a
result, arbitrary files on the target may be overwritten.
Upgrade to version v1.0b or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.