[NEWS] Aprelium Abyss Webserver X1 Arbitrary Code Execution and Header Injection
From: SecuriTeam (support_at_securiteam.com)
To: email@example.com Date: 1 Jul 2003 17:52:18 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
Beyond Security in Canada
Toronto-based Sunrays Technologies is now Beyond Security's representative in Canada.
We welcome ISPs, system integrators and IT systems resellers
to promote the most advanced vulnerability assessment solutions today.
Contact us at 416-482-0038 or at firstname.lastname@example.org
- - - - - - - - -
Aprelium Abyss Webserver X1 Arbitrary Code Execution and Header Injection
<http://www.aprelium.com/> Abyss Web Server is "a free, closed-source,
personal web server for Windows and Linux operating systems". The
Hackademy Audit team has found two remote security holes in Abyss
Webserver X1, allowing arbitrary code execution and header injection.
* Aprelium Abyss Webserver version 1.1.2
* Aprelium Abyss Webserver version 1.1.6
Remotely Exploitable Heap Buffer Overflow
A buffer of length 0x800 is allocated on the heap. An unchecked call to
strcpy() can overflow this buffer with a string of almost arbitrary length
and content which is given by a malicious attacker. The request leading to
the overflow is the following. The important part is the two characters
":\" at the end of the requested URL:
GET /AAAAAA[...]AAAA:\ HTTP/1.0
Arbitrary code can be executed on the machine running Abyss Webserver X1
with the privileges of the user running the server. This issue is not
theoretical: we wrote a functional exploit, without need for offset
guessing or brute forcing, which works on Windows 2000 and XP (any SP).
Header Injection Vulnerability
With the same type of request a 302 HTTP code is returned by Abyss X1. The
Location header sent by the server contains the URL initially requested,
but with %xx decoded to ASCII values. Embedding %0D, %0A, and %20 codes
into the URL is allowed, meaning HTTP headers can be added.
This can lead to XSS issues, setting arbitrary cookies, etc.
The information has been provided by <mailto:email@example.com> Fozzy.
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: firstname.lastname@example.org
In order to subscribe to the mailing list, simply forward this email to: email@example.com
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.