lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <7CD77D0C2B0C6141A928C5F5DC97C4C0065143@ukwtm201>
Date: Fri, 8 Aug 2003 13:33:24 +0100
From: "Brewis, Mark" <mark.brewis@....com>
To: bugtraq@...urityfocus.com
Subject: Directory Traversal in Sun iPlanet Administration Server 5.1


Text of original posting to Sun:

>>Originator: EDS Information Assurance Group - Jim Hardisty, Mark Brewis

>>Date of Contact: 22nd April 2003

>>Issue:During a recent Penetration Test, a member of the team, Jim
Hardisty, identified an issue with an installation of >>iPlanet
Administration Express.  It is possible to escape the log viewer under
iPlanet Administration Express, and 
>>since the application runs with root privilege, it is possible to access
any file on the host server, including 
>>security critical files.

>>Version:         iPlanet Administration Server 5.1

>>The following URL will return the last 5000 accesses to passwd:

>>http://192.168.192.168:5000/admin-serv/tasks/configuration/ViewLog?file=pa
sswd&num=5000
&str=&directories=admin-serv%2Flogs%2f..%2f..%2f..%2f..%2f..%2f..%2fetc&id=a
dmin-serv

>>Once an escape has been made, the drop-down menu details all files under
the called directory, e.g., /etc will lists 
>>shadow, hosts, hosts.allow, hosts.deny etc.

>>We have identified users:

>>        1) Failing to recognise the nature of the application, seeing it
only as a web configuration app, and not 
>>		 appreciating that it runs setuid 0.  As a result, they have
been cavalier with password security, applying >>		 poor
password controls, and have not applied ACLs to prevent unlimited internal
access to the application.
       
>>        2) Failing to apply a password to the application.  During
install, there must be a forced set password, and 
>>		 end-user must understand that this is a root level password
they are setting.

>>        3) Exposing the application to the Internet.

>>Whether there are other escape sequences that will work is unknown.

>>__________________


>>We will abide by the RFP Disclosure Guidelines v2.0 -
www.wiretrip.net/rfp/policy.html.

>>Should credit be forthcoming coming, please acknowledge Jim Hardisty as
the discoverer, me as second string.

>>Mark Brewis
>>Security Consultant
>>Information Assurance Group
>>EDS

SOLUTION
=========

Sun have now informed me that the issue was addressed in:

SunOne DS5.2 and in iDS5.1 SP2 Hotfix2

Sun(tm) ONE Directory Server 5.2 Release Notes 
Version 5.2
http://docs.sun.com/source/816-6703-10/index.html


iPlanet Directory Server 5.1 Service Pack 2 
Release Notes
Updated June 11, 2003
http://docs.sun.com/db/doc/816-6403-10

I am unable to find a reference for Hotfix 2, so if anyone can supply one
I'd be grateful, or if anyone can find a reference to this issue in either
of the above, I'd be even more grateful!

Mark

Mark Brewis

Security Consultant
EDS
Information Assurance Group
Wavendon Tower
Milton Keynes
Buckinghamshire
MK17 8LX.

Tel:	+44 (0)1908 28 4234/4013
Fax:	+44 (0)1908 28 4393
E@:	mark.brewis@....com

This email is confidential and intended solely for the use of the
individual(s) to whom it is addressed. Any views or opinions presented are
solely those of the author.  If you are not the intended recipient, be
advised that you have received this email in error and that any use,
dissemination, forwarding, printing, or copying of this mail is strictly
prohibited.

Precautions have been taken to minimise the risk of transmitting software
viruses, but you must carry out your own virus checks on any attachment to
this message. No liability can be accepted for any loss or damage caused by
software viruses.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ