[NEWS] Aprelium Abyss Webserver X1 Arbitrary Code Execution and Header Injection

From: SecuriTeam (support_at_securiteam.com)
Date: 07/01/03

  • Next message: SecuriTeam: "[UNIX] Linux 2.4.x execve() File Read Race Vulnerability"
    To: list@securiteam.com
    Date: 1 Jul 2003 17:52:18 +0200

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    Beyond Security in Canada

    Toronto-based Sunrays Technologies is now Beyond Security's representative in Canada.
    We welcome ISPs, system integrators and IT systems resellers
    to promote the most advanced vulnerability assessment solutions today.

    Contact us at 416-482-0038 or at canadasales@beyondsecurity.com

    - - - - - - - - -

      Aprelium Abyss Webserver X1 Arbitrary Code Execution and Header Injection


     <http://www.aprelium.com/> Abyss Web Server is "a free, closed-source,
    personal web server for Windows and Linux operating systems". The
    Hackademy Audit team has found two remote security holes in Abyss
    Webserver X1, allowing arbitrary code execution and header injection.


    Vulnerable systems:
     * Aprelium Abyss Webserver version 1.1.2

    Immune systems:
     * Aprelium Abyss Webserver version 1.1.6

    Remotely Exploitable Heap Buffer Overflow
    A buffer of length 0x800 is allocated on the heap. An unchecked call to
    strcpy() can overflow this buffer with a string of almost arbitrary length
    and content which is given by a malicious attacker. The request leading to
    the overflow is the following. The important part is the two characters
    ":\" at the end of the requested URL:

    GET /AAAAAA[...]AAAA:\ HTTP/1.0

    Arbitrary code can be executed on the machine running Abyss Webserver X1
    with the privileges of the user running the server. This issue is not
    theoretical: we wrote a functional exploit, without need for offset
    guessing or brute forcing, which works on Windows 2000 and XP (any SP).

    Header Injection Vulnerability
    With the same type of request a 302 HTTP code is returned by Abyss X1. The
    Location header sent by the server contains the URL initially requested,
    but with %xx decoded to ASCII values. Embedding %0D, %0A, and %20 codes
    into the URL is allowed, meaning HTTP headers can be added.

    This can lead to XSS issues, setting arbitrary cookies, etc.


    The information has been provided by <mailto:fozzy@dmpfrance.com> Fozzy.


    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

  • Next message: SecuriTeam: "[UNIX] Linux 2.4.x execve() File Read Race Vulnerability"