Wednesday 26 June 2013

RssReader remote code execution vulnerability

Google Reader is officially shutting down on 1 July 2013. Not everyone has jumped ship yet, so I wouldn't be surprised to see a lot of people suddenly looking for new ways to read their RSS feeds next week.

Summary: Don't install RssReader! It's the top result on Google for "rss reader", but it also lets remote attackers steal your files and run arbitrary code on your computer. 

Several years ago, I discovered a remote code execution vulnerability in RssReader, a free RSS reader for Windows. To my amazement, this vulnerability is still present today. Even worse, this software is still the first result when you do a Google search for rss reader. I think this may result in quite a few installations of this vulnerable software next week, after Google Reader shuts down for good.

The latest stable release offered on the RssReader website is This version was originally released way back in 2004! Unfortunately, for the past nine years, this version has contained a remote code execution vulnerability which allows malicious feeds to run arbitrary code on a victim's computer, or access the victim's files without consent.

The RssReader website reports more than 4.1 million downloads, but the real number is likely to be much higher, as that count does not appear to have been updated for more than two years (according to the archived pages at 

Vulnerability 1: Accessing local files with JavaScript

RssReader executes JavaScript in a context that permits access to local files through an XMLHttpRequest object.  An attacker can instantiate an XMLHttpRequest object within a malicious, remote RSS feed and then use it to read any readable file from a victim's computer. The contents of these files can then be transmitted to the remote attacker without the victim's consent or knowledge.

Vulnerability 2: Executing code on the victim's computer with VBScript

Unsurprisingly, RssReader also allows VBScript to be executed in a local context by its rendering engine. A remote attacker can instantiate a WScript.Shell object and use it to execute arbitrary code on the victim's computer. When I originally tested this on a fully-patched Windows XP machine with Internet Explorer 7, it was possible to execute programs merely by viewing a malicious RSS feed. On Windows 7 with IE 10, the user may have to click "Yes" to run the ActiveX control, depending on their security settings.

Proofs of concept

The following RSS document demonstrates how the file c:\windows\system32\drivers\etc\hosts can be accessed through a remote feed.

<rss version="2.0">
        <title>Item Title</title>
var xmlhttp = new ActiveXObject("Msxml2.XMLHTTP");"GET", "file:///c:/windows/system32/drivers/etc/hosts", true);
xmlhttp.onreadystatechange = function() {
    if (xmlhttp.readyState == 4) {

When this feed is displayed within RssReader, the contents of the victim's hosts file will be displayed in a JavaScript alert dialog:

An attacker can also use the XMLHttpRequest object to send the contents of this file - plus other potentially sensitive files - to a remote web server. No user interaction is required, so a well-crafted attack is likely to go unnoticed by its victims.

Arbitrary programs can be executed on the victim's computer by creating a WScript.Shell object and calling its Run function. This can be demonstrated by creating a feed with the following script inside an RSS item:

<script language="VBScript">
    Set objShell = CreateObject("WScript.Shell")
    objShell.Run "calc.exe", 1, True

When the victim views this feed, calc.exe will be executed:

As noted earlier, depending on the victim's operating system, browser version and security settings, this code execution vulnerability could also be exploited without requiring any user interaction, and a cleverly crafted attack is unlikely to be noticed by the victim.

Obviously, when a remote attacker is able to run arbitrary code on a victim's computer, it makes it a lot easier to gain unauthorised access to any of the victim's accounts on other sites and services, such as Facebook, Twitter, Gmail, Flickr, etc.

An attacker does not necessarily have to entice his victim into subscribing to a malicious feed; the vulnerability can also be exploited through a feed that the victim has already subscribed to, either by compromising the server hosting the feed, or by writing a specially-crafted blog post which is syndicated by other third-party feeds.


Unfortunately, RssReader does not appear to be maintained any more. The software has not been updated since 2004, the latest bugs listed on the website date from 2003, and emails to are being bounced. With that in mind, I'm surprised it's still the top result on Google for rss reader.

So for now, the only sensible thing to do is to avoid installing RssReader, and make sure everyone else avoids it, too!

It might appear reasonable and responsible for Google to place a warning in its search results, or perhaps even reduce its ranking in search results - particularly over the coming weeks.


  1. I m software developer and recently develope a RssReader remote code execution system for custom boxes Australia Brand and get too much benefits.

  2. Amazing softwear share is great sharing for informative post. Thanks for sharing. You've get some good and quick services then go for it and get all services them.
    Custom Packaging solution

  3. The G2 pool cleaner is the best robot pool cleaner for any family pool. Contrast it with other pool cleaners utilizing our Buyers Guide table. Additionally read about the top cleaners and which one is directly for your pool here.

  4. We give you a 12 week home workout plan that works both for men and women which will help you achieve the results you want.

  5. Dr. Ezekiel Akande is a humanitarian and is keen on clean vitality advancement in Africa particularly as it impacts the basic turn of events. A large portion of his innovative undertakings has been in clean vitality, man-made consciousness, huge information, and lodging improvement.

  6. They effectively communicate service design firms, which supports a productive partnership.
    mobile app design agency

  7. Thank you for posting such a great article! I found your website perfect for my needs. It contains wonderful and helpful posts. Keep up the good work!. Thank you for this wonderful Article! 토토사이트

  8. I really like your writing style, great information, thankyou for posting 룰렛

  9. 메리트카지노14 December 2021 at 08:58

    Your writing is perfect and complete. 메리트카지노 However, I think it will be more wonderful if your post includes additional topics that I am thinking of. I have a lot of posts on my site similar to your topic. Would you like to visit once?

  10. 바카라사이트10 January 2022 at 06:19

    You are really a genius. I also run a blog, but I don't have genius skills like you. However, I am also writing hard. If possible, please visit my blog and leave a comment. Thank you. 바카라사이트

  11. Thanks for sharing. I found a lot of interesting information here. A really good post, very thankful and hopeful that you will write many more posts like this one. 야한동영상

    Please visit once. I leave my blog address below

  12. Great Information sharing .. I am very happy to read this article .. thanks for giving us go through info. Fantastic nice. I appreciate this post. 국산야동

    Please visit once. I leave my blog address below

  13. I read this interesting article. I admire your efforts in writing this essay. I just wanted to express my gratitude for taking the time to offer your ideas and knowledge on this subject.
    how long does an uncontested divorce take in New Jersey

  14. I am sad about the news that RSS will be shutting down but looking forward to reading new RSS. Cooktop Repair

  15. Wonderful post. Thank you for updating such an informative content.
    In Virginia Protective Order is a legal document issued by a court to provide protection to individuals who have been victims of domestic violence, stalking, sexual assault, or other forms of harm.

  16. this article is really informative and also more information visit on Self Blown

  17. Users of this program should take the RSSReader remote code execution vulnerability very seriously. This vulnerability presents a serious security risk since it might enable malicious actors to run arbitrary code on a victim's system. It emphasizes how crucial it is to rapidly fix vulnerabilities in software applications and keep them updated on a regular basis. Users are strongly recommended to take urgent steps to reduce this risk and ensure the security of their systems, such as installing patches or updates. This incident also serves as a warning for developers to put strong security measures in place during the development process to avoid the emergence of such vulnerabilities in the first place.
    virginia beach personal injury attorney
    Lawyer Wills and Estates

  18. I assume you made certain nice points in features also.

  19. I’m really enjoying the design and layout of your site.

  20. Some genuinely nice and utilitarian info on this internet site, also I believe the style has great features.


  21. Thanks for the update and quick reply. I’ll be sure to keep an eye on this thread.

  22. Well I truly enjoyed reading it. This subject offered by you is very helpful and accurate.

  23. What an interesting article! I'm glad i finally found what i was looking for.

  24. Clarify what high severity means in different contexts, whether it's in software development, cybersecurity, healthcare, or other industries. Explain the significance of identifying and categorizing issues by severity levels.
    lawyers for bankruptcies near me

  25. The RSSReader remote code execution vulnerability poses a critical threat to system security. This flaw allows malicious actors to execute arbitrary code on targeted systems remotely, potentially leading to unauthorized access, data breaches, and system compromise.
    How long Can a Divorce Take in New York

  26. cannot assist with providing information or guidance on exploiting security vulnerabilities, including remote code execution vulnerabilities. If you have concerns about a specific software vulnerability, I recommend reaching out to the software vendor or relevant security authorities to report it responsibly. Exploiting vulnerabilities can lead to serious consequences and is against ethical guidelines. If you have any other non-exploitative questions or topics you'd like assistance with, feel free to ask.
    estate and tax lawyer

  27. You have a very good gloss. Write more high-quality articles. I support you.

  28. Thank you for the efforts you made in writing this article. Keep Blogging!!

  29. I am hoping the same best work from you in the future as well. Its Amazing blog.