RE: axis2400 webcams

From: Barry Zubel (barryat_private)
Date: Fri Feb 28 2003 - 09:19:04 PST

  • Next message: Martin Eiszner: "typo3 issues"

    Tested the viewing of http://server/log/messages on Axis 2100 model, and it is
    vulnerable.
    
    Didn't try to check the overwrite vulnerability - I'd rather not, just in case.
    :)
    
    Barry Zubel
    Able Packaging Designs Ltd
    
    ***************************************************************************
    This email may contain confidential information and/or copyright material.
    This email is intended for the use of the addressee only. Any unauthorised
    use may be unlawful. If you receive this email by mistake, please advise
    the sender immediately by using the reply facility in your email software.
    Thank you for your cooperation.
    
    Please note that any opinions expressed in this e-mail are those of the
    author personally and are not necessarily those of the Company or any of
    its subsidiary companies, none of whom accept responsibility for the
    contents of the message. This footnote also confirms that this email
    message has been swept for the presence of computer viruses.
    ***************************************************************************
    
    
    
    -----Original Message-----
    From: Martin Eiszner [mailto:martinat_private] 
    Sent: 28 February 2003 09:46
    To: bugtraqat_private
    Subject: axis2400 webcams
    
    
    
    
    2002at_private/Martin Eiszner
    
    ==================================
    Security REPORT axis webcam 2400.? ==================================
    
    this document: http://www.websec.org/adv/axis2400.txt.html
    
    Product: Axis Webserver for 2400 ??
    Vulnerablities: denial of service, information disclosure, non-confirmed script
    execution
    Vendor: Axis (http://www.axis.com)
    Vendor-Status: E-Mail to "securityat_private" and "anne.rhenmanat_private" date:
    17.01.2003
    Vendor-Patch: no response (28.02.2003)
    
    Local: NO
    Remote: YES
    
    ============
    Introduction
    ============
    
    webcam system including modified boa-webserver and web-based admin-interface ...
    
    
    =====================
    Vulnerability Details
    =====================
    
    
    1) INFORMATION DISCLOSURE
    
    http-requests to:
    
    ---*---
    http://server/support/messages
    ---*---
    
    responds with /var/log/messages.
    it is not password protected and might disclose sensitive information.
    
    
    2) DOS / OVERWRITING SYSTEM-FILES
    requesting:
    ---*---
    http://server/axis-cgi/buffer/command.cgi?
    buffername=X&
    prealarm=1&
    postalarm=1&
    do=start&
    uri=/jpg/quad.jpg&
    format=[bad input]
    ---*---
    
    allows an attacker to overwrite important files on the system (all fifos for
    example) leading to an effective DOS-attack.
    
    
    3) ARBITRARY FILE CREATION
    
    a request like:
    ---*---
    /axis-cgi/buffer/command.cgi?whatever params buffername=[relative path to
    directory] format=[relative path to arbitrary file name]
    ---*---
    
    will create [relative path to arbitrary file name] or [relative path to a.
    directory]
    
    if somebody is able to change content of error messages he might be able to
    create and execute arbitrary script-files(php fE.).
    
    
    severity: LOW-MEDIUM
    
    
    =======
    Remarks
    =======
    
    ---
    
    ====================
    Recommended Hotfixes
    ====================
    
    software patch.
    
    
    EOF Martin Eiszner / @2002WebSec.org
    =======
    Contact
    =======
    
    WebSec.org / Martin Eiszner
    Gurkgasse 49/Top14
    1140 Vienna
    
    Austria / EUROPE
    
    meiat_private
    http://www.websec.org
    



    This archive was generated by hypermail 2b30 : Fri Feb 28 2003 - 09:38:30 PST