r u serious? On Fri, Apr 4, 2008 at 10:48 AM, Micheal Turner <[EMAIL PROTECTED]> wrote:
> n3td3v agenda & Cyber Security group > ==================================== > > Solid Information Security State Release #0012a > > MARKING: RESTRICTIONS APPLY. > FAO: WORLD LEADERS > > == Introduction == > Serious high-risk ultra critical vulnerability has > been identified in Remote Help application that maybe > used by CIA, NSA and FBI employees when helping > colleagues on anti-terror campaigns.RemoteHelp is a > minimal http server that allows to view and control a > remote pc running a 32-bits version of Microsoft > Windows. > current version is 0.0.6 and runs stand-alone or > installs as a service. > > == URL == > http://sourceforge.net/projects/remotehelp/ > > == HISTORY == > After n3td3v agenda emailed the NSA, SANS and all > information security groups and was found not to be > taken seriously. High risk proof of concept exploit > code has been authored for severe vulnerability in > Remote Help application which maybe used by any number > of Yahoo!, Google!, Ebay! or NSA employees. This > vulnerability gives rise to serious national > infrastructure risk and should not be under estimated! > > == Proof of Concept == > I found a vulnerability in the pages.c file which > generates the login page dialog and authenticates a > user after it checks if your "user" and "pass" > parameter match the defaults > (user/default) it does this: > > strncpy(cookie,"user=default; path=/; expires=Sun, > 11-May-2030 22:11:40 GMT",1024); > > for a valid login and for an invalid login it sets an > expired cookie like so; > strncpy(cookie,"user=default; path=/; expires=Sun, > 11-May-1970 22:11:40 GMT",1024); > > all you have to do is add "Cookie: user=default; > path=/; expires=Sun, 11-May-2030 22:11:40 GMT" to your > HTTP request and you can bypass > authentication to the Remote Help server and access > the filesystem/exec commands/view the webcam of the > hosts running it. > > == Credit == > > n3td3v & documentation help by Michael Turner. > > "Never trust your employees." > > > ___________________________________________________________ > Yahoo! For Good helps you make a difference > > http://uk.promotions.yahoo.com/forgood/ > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
