LOCATION:
Neohapsis / Archives / VulnWatch / Message Index / [VulnWatch] Remote Root Hole in Cherokee Webserver |
From: bugtraq (bugtraq@bugtraq.org)
Date: Sat Dec 29 2001 - 01:50:02 CST
Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Hi,
Here are some quick notes, in form of a brief advisory, on two issues in
Cherokee Webserver which allows a quick remote root of a server.
Regards,
GOBBLES Security
GOBBLES@hushmail.com
http://www.bugtraq.org
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++GOBBLES+SECURITY+RESEARCH+TEAM+INCORPORATED+++++++++++++++++
ALERT! ALERT! CHEROKEE WEBSERVER HAS SEVERE SECURITY HOLES! ALERT! ALERT!
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
After an email conversation between rfp (rain.forest.puppy) and a GOBBLES
Lab research, we have learned that there has recently been an outbreak in
fake advisories and trojaned exploits that are being submitted to these
security mailing lists. The moderators are working very hard to sort out
the legitimate advisories from the immature pranks of many, and they all
deserve words of thanks for their hard work. This courtesy however should
not extend to the moderators of the so called full-disclosure mailing
lists that delay the release of information to increase the attention to
their commercial services. GOBBLES Security feels no sympathy for those
moderators while they have to sort through these childish and immature
pranks. This should not be interpreted as encouragement for said actions
against anyone, but rather as encouragement for the hard workers who have
to put up with the same crap. Always remember, full disclosure is a
necessary evil, which makes it one of the few sins that God doesn't frown
upon. Remember, this is the holiday season, and it's important to give...
PRODUCT
*******
Program:
Cherokee Webserver
Website:
http://aurora.esi.uem.es/~alo/?action=cherokee
BACKGROUND
**********
After the recent discoveries of multiple remote vulnerabilities in Apache
Server (www.apache.org) by security companies (chiefly NAI.com/horizon),
GOBBLES members have been investigating other http servers to see if they
can outperform the security of Apache Server (yes, we have developed our
own remote exploits for Apache Server and are keeping them quiet for the
time -- go ahead and call us filthy blackhats, we have our own personal
reasons for not disclosing them at this time). We think Apache Server is
a _great_ product; we're just interested in seeing how others line up
against it.
One of the servers we came across is Cherokee Webserver. From the
author's website, I submit the following paste:
alo's homepage (p1
of 2)
Join www.godsmaze.org now ;-)
Back to home
Cherokee
an extra-light web server
Cherokee is an extremely fast and tiny web server.
Features
* Basic HTTP sever
* FAST and tiny
* Embedable
* Runs under a chroot enviroment
* Supports htdocs path in compilation
* Can work as a daemon
Benchmark
Cherokee 0.2.0
Apache 1.3.22
Requests per second: 5503.58 [#/sec]
Time per request: 9.09 [ms]
Time per request: 0.18 [ms] (concurrent req)
Transfer rate: 1095.36 [Kbytes/sec]
Requests per second: 857.19 [#/sec]
Time per request: 58.33 [ms]
Time per request: 1.17 [ms] (concurrent req)
Transfer rate: 366.91 [Kbytes/sec]
Executable size: 7.4Kb
Executable size: 504Kb
Benchmark "ab" (Apache Benchmark program) executed doing 10.000
queries and 50 clients concurrently
As you can see, this server brags exceptional speed. The real question
is, however, is it secure?
Our tests suggest it isn't. >:-)
PROBLEMS
********
The first problem is a simple directory traversal bug. No exploit code is
needed to demonstrate this; netcat and Internet Explorer seem to be
sufficient. By adding several instances of /../ to the end of a request,
one is able to traverse the entire filesystem.
Notice, this server brags to run in a "chroot" environment, but by this
test we see something is definately wrong.
The second problem is that it does not drop privilages. Since it needs to
start as root to bind to tcp 80, and does not drop privilages, there is an
obvious problem. Without even doing a source code audit, we immediately
realize the potential and instantaneous remote root comprimise here when
used with the first problem described above; a clever penetrator who is
familiar with various password storage mechanisms on Unix-basd platforms
will know enough to go after files like /etc/passwd|shadow|master.passwd,
then from there it's just a matter of ./john -i to become root.
WORKAROUNDS
***********
GOBBLES Labs highly recommends using a better http server, one that can at
least attempt to brag security. Speed isn't as important as security, so
don't trust any product that only brags speed.
*note from GOBBLES:
hey hey hey it GOBBLES hehehe all GOBBLES want to say is that he did not
instruct researchers at GOBBLES Labs to investigate further into this
and there probably many holes in sourcecode like bufferoverflow and
format bug strings for easier exploitation but GOBBLES think after
showing two root hole in product it time to move on and go to next and
that GOBBLES promise to revisit it after author patch these problems,
hehe, at least make it chroot! *
GREETS
******
dianora, tsk, snow, carolyn meinel, john vranesevich, steve gibson, kimble,
knightmare, emmanuel goldstein, box.sk, @stake, securityfocus, sans.org,
blackhat.com, defcon.org, 2600.com, #phrack@efnet, #hackphreak@undernet,
bugtraq (thanks aleph1 and david ahmad for devoting your time to a great
list), ntbugtraq (russel the love muscle ;D), cert.org, paul vixie, vesselin
bontchev, reese witherspoon, kirsten dunst, katie holmes, aleister crowley,
manly p hall, franz bardon, dennis ritchie, nietzsche, w. richard stevens,
radiohead, george michael, larry wall, beethoven, francis bacon, bruce
willis, bruce schneier, alan turing, john von neumann, donald knuth, michael
abrash, robert sedgewick, richard simmons, government boy, ralph lauren,
kevin mitnick, david koresh, the violent femmes, legions of doom, quentin
tarantino, JUPES, security.nnov.ru, dugsong, wayne gretzky,
hhp-programming.net, so1o, the HaX0R bRoThErS, nasa.gov, alfred hitchcock,
ray bradbury, linux torvalds, alyssa milano, sarah michelle geller, jennifer
lopez, catherine zeta jones, robert de niro, plato, leonardo da vinci,
nostradamus, adam weishaupt, adema, kmfdm, eliphas levi, john dee, goo goo
dolls, savage garden, george bush, john howard, tony blair, ashida kim,
andrew tanenbaum, comp.lang.c, solar designer, patanjali, vayu siddhi,
deepak chopra, ajna chakra, fuzzy bunny, lockdown, bronc buster,
attrition.org, cliff stoll, bill gates, alan cox, george harrison,
berkeley.edu, microsoft.com, isox, american mcgee, princess toadstool, ru
paul, sharon stone, taeho oh, napster, nocarrier, steve wozniak, captian
crunch, tony the tiger, julliette lewis, oliver twist, yakko, wakko, santa
claus, the easter bunny, the christmas tree, hacktech.org, mixter and the
rest of #darknet/2xs, the planet Pluto, pluto the dog, walt disney, the
smurfs, packetstormsecurity.org, chocolate, caramel, marshmallows, rice
crispies, rice crispie treats, cousin WOBBLES, rfp, Alan@packetstorm, george
bush senior, george w. bush, his drunken daughters, gary coleman, fat
albert, rhino9, eEye.com, the djali zwan, digital unix, o'reilly &
associates, hwa-security.net, #malvu/efnet, donkey kong, diddy kong, p
diddy, mr. peanut, all girls who pose naked on webcam for GOBBLES, mr
goldilocks, checkpoint.com, whoever invented deoderant, monkey.org, bono,
micheal stipes, clark kent, bruce banner, ssh.com, hacked.cisco.com, thomas
edison, steven king, P80 Systems, gnutella, colin powell, Joakim von Braun,
#openbsd/efnet, jnathan/efnet, debian.org, mr. ed, scooby doo, spud
mckenzie, sam i am, guy who wrote that bible book, george b. thomas junior,
ross l. finney, maurice d. wier, john bobbit, transmeta.com, linus torvalds,
naked supermodel in magazines, d'arcy gretzky, deep purple, shampoos that
kill head lice, kraft.com, george clooney, jonathon swift, plan9 from outer
space, penelope cruz, chuck norris, mandy moore, christina aguilera, drew
barrymore, bjarne stroustrup, psychic friends network, david letterman,
~el8, jennicide, the mentor, kevin spacey, sho kosugi, michael dudikoff,
HERT, anton lavey, daath, stephen hawking, the illuminati, sml@subterrain.net,
spinux, efnet@ROUTE, the movie "dirty dancing", darth maul, liz taylor,
barney rubble, pacman, the fantastic four, Narr0w, angrypackets.com, sinbad,
jim phillips, the movie "pink flamingos" -- wonderful performance ricki lake,
guy who invent drugs, skyper (you promised we be Prophile not noise, but we
love you anyways), all the ninjas, charlie root for all he emails, wyatt erp,
nmrc.org, paul albitz, cricket liu, kurt kerns, #!/bin/zsh, harry houdini,
all security.is psychologists (hehe), guy anonymous (wrote book Maximum Linux
Security on how to use free software, hehe), and all our friends and family.
|
Portions of this site are copyright
1998-2001, Neohapsis, Inc. Questions, comments or feedback, send E-mail
to webmaster@neohapsis.com
|
|