[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-users] Chili!Soft ASP Multiple Vulnerabilities



I did not find any references to 'the sample ASP file in your httpd.conf' .
Does anyone know what specific code they are talking about?

Mike
----- Original Message -----
From: "John Cordeiro" <jcordeiro@xxxxxxxxxxxxxxx>
To: <cobalt-users@xxxxxxxxxxxxxxx>
Sent: Wednesday, February 21, 2001 2:31 PM
Subject: RE: [cobalt-users] Chili!Soft ASP Multiple Vulnerabilities


> Wow I just shut off my Chilisoft also I checked the url against my domain
> server and BAM Password clear as Day. Could they make this any easier!
>
> John Corderio
>
> -----Original Message-----
> From: cobalt-users-admin@xxxxxxxxxxxxxxx
> [mailto:cobalt-users-admin@xxxxxxxxxxxxxxx]On Behalf Of GPS
> Sent: Wednesday, February 21, 2001 4:47 PM
> To: Cobalt-Users@Cobalt. Com
> Subject: [cobalt-users] Chili!Soft ASP Multiple Vulnerabilities
> Importance: High
>
>
> Well here's another one just posted to BugTraq:
>
> I tried the first Example on a Raq4 after starting the ChiliSoft ASP
server.
>
>
http://<server>/caspsamp/codebrws.asp?source=/caspsamp/../admin/conf/service
> .pwd
>
> ChiliSoft very politely returns the servers ADMIN and encrypted password
to
> the browser.
> The ChiliSoft Server Admin Password is the same as the Servers Main Admin
> aka Root.
> I don't care to test the other vunerabilities...ChiliSoft is now gone.
> If anyone finds that any of this is really not applicable to the Raq4's
> please advise nicely...
> no need to flame.
>
>
> The advisory author states that he advised the vendor (that would be
Cobalt)
> on December 30, 2000.
> I don't see any ChiliSoft Security updates on the Cobalt site.
>
>
>
> Here's the complete advisory:
>
============================================================================
> ======
> Author:   Stan Bubrouski (stan@xxxxxxxxxxx)
> Date:   February 20, 2001
> Package:  Chili!Soft ASP
> Versions affected:  3.5.2 and possibly previous versions.
> Severity:  (1) A remote user could potentially view sensative information
> and
>               take remote control of the server.  (2) The installer
installs
>               a default username and password for the adminstrative
console
>               if auto-detect of settings is used.  (3) There are also
> several
>               serious file permissions problems.
>
> Problems:
>
> (1) Chili!Soft ASP ships with samples scripts which are located in
>     /opt/casp/caspsamp by default and are installed on webservers by
default
>     accessable via http://<server>/caspsamp/ A sample script named
>     codebrws.asp prolly taken from IIS/4.0 originally is vulnerable to a
>     "../" attack allowing sensative information to be revieled to remote
>     users.  During brief testing I was only able to get the script to read
>     files on directory above the caspsamp directory which is the /opt/casp
>     directory by default.  This directory contains database
>     usernames/passwords, the server logs, and the username/password to
>     administration console.  With the password to the administrative
console
>     a remote user with web access can remotely manage the server thus
>     openning endless possibilies since the console runs as root.
>
>     It appears they attempted to prevent people from viewing files outside
>     the samples directory because when I tried with an url not containing
>     /caspsamp/ at the begining it would fail and warn me that I'm not
> allowed
>     to view files outside the samples directory.
>
> (2) The installer program installs a default username and password for
>     adminstration console which is remotely accessable via the web.  The
>     username/password are stored in the file /opt/admin/conf/service.pwd
>     which is probably the only file installed with the correct permissions
>     (in this case mode 600).
>
> (3) There are several files installed mode 666 which is a serious no-no as
>     some logs and configuration files are affected by this. On my system
the
>     following files were installed mode 666:
>
> /opt/casp/logs/install_summary
> /opt/casp/logs/install
> /opt/casp/logs/register
> /opt/casp/logs/server-3000
> /opt/casp/logs/component
> /opt/casp/caspsamp/401K/database/QEDBF.INI
> /opt/casp/caspsamp/friendship/agent/database/QEDBF.INI
> /opt/casp/caspsamp/friendship/client/database/QEDBF.INI
> /opt/casp/caspsamp/QEDBF.INI
> /opt/casp/chilicom/lib/hkey.current.user
> /opt/casp/chilicom/lib/hkey.local.machine
> /opt/casp/INSTALL/.webserver-cache
> /opt/casp/.installed_db
> /opt/casp/admin/conf/hkey.current.user
> /opt/casp/admin/conf/hkey.local.machine
> /opt/casp/admin/logs/server
>
>     This may seem bad it gets worse.  Most of the files dealing with
>     databases such as global_odbc.ini and odbc.ini are all world-readable
> and
>     thus by default expose passwords administrators may lator install to
>     local users.  All configuration files for the server and subsequent
> other
>     services offered Chili!Soft ASP are also world-readable exposing even
>     more useful information to local users.
>
> Examples:
>
http://<server>/caspsamp/codebrws.asp?source=/caspsamp/../admin/conf/service
> .pwd
> http://<server>/caspsamp/codebrws.asp?source=/caspsamp/../global_odbc.ini
>
http://<server>/caspsamp/codebrws.asp?source=/caspsamp/../admin/logs/server
> http://<server>/caspsamp/codebrws.asp?source=/caspsamp/../LICENSE.LIC
> http://<server>/caspsamp/codebrws.asp?source=/caspsamp/../logs/server-3000
>
> Solution: Remove all references to the sample ASP file in your httpd.conf
> and
> replace the default admin account.  Then change file permissions in
> /opt/casp
> as your system security dictates (in other words figure it out for
yourself)
>
> Vendor Status: Vendor was e-mailed these problems on December 30, 2000.
>
> Copyright ©2001 Stan Bubrouski
>
>
>
> _______________________________________________
> cobalt-users mailing list
> cobalt-users@xxxxxxxxxxxxxxx
> To Subscribe or Unsubscribe, please go to:
> http://list.cobalt.com/mailman/listinfo/cobalt-users
>
> _______________________________________________
> cobalt-users mailing list
> cobalt-users@xxxxxxxxxxxxxxx
> To Subscribe or Unsubscribe, please go to:
> http://list.cobalt.com/mailman/listinfo/cobalt-users