[resend] Strumpf Noir Society on BadBlue

From: Strumpf Noir Society (vuln-devat_private)
Date: Mon Jan 21 2002 - 06:07:15 PST

  • Next message: Pete Finnigan: "Re: Breakable"

    Strumpf Noir Society Summaries
    ! Public release !
    <--#
    
    
    -= Strumpf Noir Society on BadBlue =-
    
    (Sorry, couldn't resist.. Ok, so we might not be able to actually
    drive a Mach truck, but this seems to do the trick, give or take
    a few millions :)
    
    
    Release date: Thursday, January 17, 2002
    
    
    Introduction
    
    BadBlue is the technology behind Working Resources Inc.'s product line with
    the same name and which, amongst other things, also powers Deerfield.com's
    D2Gfx file sharing community.
    
    Working Resources Inc. :        http://www.badblue.com
    Deerfield's D2Gfx :             http://d2gfx.deerfield.com
    
    
    Summary
    
    Below advisory will serve as a summary for our advisories sns2k2-badblue2
    through sns2k-badblue6. These are all more or less related problems in 
    mentioned software and we would not want to annoy too many people at 
    once by sending out five advisories for one product, let's leave some
    for next time eh?
    
    (More details are available from our web site [1].)
    
    
    Introduction
    
    The BadBlue technology suffers from multiple vulnerabilities which
    allow for a resource exhaustion attack to be executed against the server
    and which could be abused to obtain read access to any file and to 
    execute system commands on the target host.
    
    
    When the going goes wrong, part 1:
    
    BadBlue's main purposes are web serving and peer-to-peer file sharing.
    Due to configuration issues between these functionalities, it is possible
    to defeat the server's authentication schemes to execute commands on 
    the system. Three different approaches have been found to easily circumvent
    BadBlue's ip-based authentication. For these attacks to work, the attacker 
    will need to have upload access to either a shared or virtual directory on
    the target system, or has to trick the system owner into putting his files
    in such a directory for him. 
    
    Of all tested systems only BadBlue EE seems to include this upload 
    functionality and as such is the only system directly vulnerable to these
    attacks. We feel however that these vulnerabilities represent certain 
    implementation issues in the whole of the product line. These will be looked
    into by Working Resources Inc. in the next release of their product.
    
    The attacks themselves consist of administrative command execution through
    PHP or CGI-equivalent scripting, administrative command execution through
    HTML tags and system command execution through MS Word macros.
    
    
    Vulnerable:
    
    - BadBlue Enterprise Edition (v1.5.?) for Win9x/NT/2000/ME/XP
    
    Mentioned problems DO work on other versions of the software as well, however
    it will require some social engineering to get the malicious files in an
    accessible directory on the server.
    
    
    When the going goes wrong, part 2:
    
    BadBlue includes the ability to serve transcoded MS Office document data
    over the web through a number of scripts/templates. More specifically,
    the server is compatible with MS Word, MS Excel and MS Access. Due to two 
    problems found to be shared in the accompanying scripts doc.htx, xls.htx 
    and mdb.htx however, it is possible to remotely spawn multiple instances
    of mentioned MS Office applications on the target system. This could be
    abused in the form of a resource exhaustion attack. Also, there exists a
    directory traversal attack in the parsers for these documents, which could
    allow an attacker read access to any file on the target system. All systems
    tested (BadBlue as well as D2Gfx) were vulnerable to these problems.
    
    
    Vulnerable:
    
    - BadBlue Personal Edition (v1.5.6 Beta) for Win95/NT4
    - BadBlue Personal Edition (v1.5.6 Beta) for Win98/2000/ME/XP
    - BadBlue Enterprise Edition (v1.5.?) for Win95/NT4
    - BadBlue Enterprise Edition (v1.5.?) for Win98/2000/ME/XP
    - Deerfield D2Gfx (v1.0.2 - Effectively BadBlue v1.0.2) for 
    Win9x/NT/2000/ME/XP
    
    All earlier versions which include mentioned .htx files are expected
    to be fully or partially vulnerable to these problems.
    
    
    Vendor status:
    
    Vendor has been notified and has verified above issues. Currently a new
    version of the BadBlue software is in the making, however no release date
    for this was available at this time. Since some of the mentioned 
    vulnerabilities leave a users system rather wide open, we've decided to 
    post information on these issues and temporary workarounds. Users are
    encouraged to upgrade as soon as the new BadBlue release comes 
    available.
    
    
    Workarounds/fixes:
    
    1) Do not allow uploads to directories which can be accessed from the
    server. This means virtual AS WELL AS shared directories.
    
    2) If you have no use for the MS Office document sharing functions of
    BadBlue, delete/rename/replace the following files: doc.htx, xls.htx and
    mdb.htx.
    
    3) If you do share MS Office documents through BadBlue, share them as
    single files (meaning: do not select the "Share all files in this
    folder (*.*)" option.
    
    4) Limit the number of IP's to which your BadBlue server is accessible
    to as few as possible through the "Restrict access by IP address" menu
    under the "Advanced web server functions".
    
    A possible fifth and final recommendation would be to disable IRC sharing.
    This can be done in BadBlue's "Set your searching options" menu. Altough 
    not a security issue perse, this feature is enabled by default in the BadBlue 
    server installation (not in the D2Gfx version btw, which uses an older 
    version of the BadBlue technology) and, besides some information disclosure, 
    makes life quite a lot easier for anyone trying to find potential targets. 
    Alternatives will be included in the next BadBlue release.
    
    
    References:
    
    Full advisories available from http://labs.secureance.com:
    
    sns2k2-badblue2-adv:    "BadBlue Scripting Directory Traversal Vulnerability"
    sns2k2-badblue3-adv:    "BadBlue Extensions Authentication Bypassing Vulnerability"
    sns2k2-badblue4-adv:    "BadBlue Scripting Resource Exhaustion Vulnerability"
    sns2k2-badblue5-adv:    "BadBlue HTML Tag Command Execution Vulnerability"
    sns2k2-badblue6-adv:    "BadBlue Macro Execution Vulnerability"
    
    
    yadayadayada
    
    SNS Research is rfpolicy (http://www.wiretrip.net/rfp/policy.html) 
    compliant, all information is provided on AS IS basis.
    
    EOF, but Strumpf Noir Society will return!
    



    This archive was generated by hypermail 2b30 : Mon Jan 21 2002 - 09:37:01 PST