[NEWS] Aprelium Abyss Webserver X1 Arbitrary Code Execution and Header Injection

From: SecuriTeam (support_at_securiteam.com)
Date: 07/01/03

  • Next message: SecuriTeam: "[UNIX] Linux 2.4.x execve() File Read Race Vulnerability"
    To: list@securiteam.com
    Date: 1 Jul 2003 17:52:18 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    Beyond Security in Canada

    Toronto-based Sunrays Technologies is now Beyond Security's representative in Canada.
    We welcome ISPs, system integrators and IT systems resellers
    to promote the most advanced vulnerability assessment solutions today.

    Contact us at 416-482-0038 or at canadasales@beyondsecurity.com

    - - - - - - - - -

      Aprelium Abyss Webserver X1 Arbitrary Code Execution and Header Injection
    ------------------------------------------------------------------------

    SUMMARY

     <http://www.aprelium.com/> Abyss Web Server is "a free, closed-source,
    personal web server for Windows and Linux operating systems". The
    Hackademy Audit team has found two remote security holes in Abyss
    Webserver X1, allowing arbitrary code execution and header injection.

    DETAILS

    Vulnerable systems:
     * Aprelium Abyss Webserver version 1.1.2

    Immune systems:
     * Aprelium Abyss Webserver version 1.1.6

    Remotely Exploitable Heap Buffer Overflow
    A buffer of length 0x800 is allocated on the heap. An unchecked call to
    strcpy() can overflow this buffer with a string of almost arbitrary length
    and content which is given by a malicious attacker. The request leading to
    the overflow is the following. The important part is the two characters
    ":\" at the end of the requested URL:

    GET /AAAAAA[...]AAAA:\ HTTP/1.0

    Impact:
    Arbitrary code can be executed on the machine running Abyss Webserver X1
    with the privileges of the user running the server. This issue is not
    theoretical: we wrote a functional exploit, without need for offset
    guessing or brute forcing, which works on Windows 2000 and XP (any SP).

    Header Injection Vulnerability
    With the same type of request a 302 HTTP code is returned by Abyss X1. The
    Location header sent by the server contains the URL initially requested,
    but with %xx decoded to ASCII values. Embedding %0D, %0A, and %20 codes
    into the URL is allowed, meaning HTTP headers can be added.

    Impact:
    This can lead to XSS issues, setting arbitrary cookies, etc.

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:fozzy@dmpfrance.com> Fozzy.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[UNIX] Linux 2.4.x execve() File Read Race Vulnerability"

    Relevant Pages

    • Re: uh? security problem?
      ... Then you will have "Sharing And Security" in the ... context menu for files, folders, etc. in Windows Explorer. ... > granting access rights to the resource to the ASP.NET request identity. ... > eventArgument) +5 ...
      (microsoft.public.dotnet.framework.aspnet)
    • Re: uh? security problem?
      ... It appears that your IIS user account does not have access to that file. ... Try sharing the file and setting the security levels to allow everyone full ... > granting access rights to the resource to the ASP.NET request identity. ... > eventArgument) +5 ...
      (microsoft.public.dotnet.framework.aspnet)
    • [UNIX] Invision Power Board SQL Injection Vulnerability (sources/calendar.php)
      ... Get your security news from a reliable source. ... An SQL injection vulnerability in IPB's calendar support, ... We execute the following request: ... As it is a request of type SELECT, we can use for example the clause ...
      (Securiteam)
    • [NT] Gaining Root Access via PHP.exe
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... arbitrary code by inserting into the Apache log file a malicious PHP based ... Apache will then add this request line to the access.log file. ... Test that the file can be accessed via your browser by typing ...
      (Securiteam)
    • Custom object passed to a remote object method - SecurityException
      ... Because of security restrictions, ... Unhandled Exception: System.Runtime.Serialization.SerializationException: ... ---> System.Security.SecurityException: Request failed. ... (String objectUri, Stream inputStream, Boolean bStrictBinding, ...
      (microsoft.public.dotnet.framework.remoting)