Breaking Cobalt's RaQ2 password CGI
----------------------------------------------------------------------------
----
SUMMARY
Security vulnerability in Cobalt's RaQ2 User Management CGI
(siteUserMod.cgi) allows remote attackers to change any user's password
including that of other administrators without the need for administration
privileges.
DETAILS
Exploit:
To replicate this bug you must have Site Administrator access to one of
the accounts on the server. When you go into the Site Management for a
site and select the User Management option, you get a list of the
usernames that have been setup for that account.
The green pencil edit icon is a command to execute the JavaScript function
modify() and it passes the username as the only variable into the
function. To properly execute a function from the Location Bar in
Netscape, the HTML page has to be the top frame.
Then you only need to open the userList.html file in a new frame. When
you type "javascript: modify( 'admin' );" into the Location Bar, the
modify() function returns a URL.
The URL returned is something like:
http://yoursite:81/cgi-bin/.cobalt/siteUserMod/siteUserMod.cgi?username=admi
n&group=site151&949015199230
(NOTE: URL might be wrapped, and it contains a token, that cannot be
reused)
This loads a standard Modify User page for the "admin" account. However,
when you attempt to change its information by clicking the "Confirm
Modify" button, it returns a JavaScript error because the function that it
calls upon is dependant on the frame layout of the Site Management page.
To overcome this, you can simply download the two HTML files to your hard
disk. One is the index.html file; the other is the right.html file. Now
just change the index.html file to call upon the URL of the remote site
and the URL of the local right.html file.
Then change the right.html file to load the URL that was previously
discovered:
http://yoursite:81/cgi-bin/.cobalt/siteUserMod/siteUserMod.cgi?username=admi
n&group=site151&949015199230
(This will cause it to load up the "Modify User" page for the "admin"
account).
After you have clicked on the link it will load up with all the correct
frames and the "Modify User" page for the "admin" account. Now you can
enter a new password for the "admin" user and click "Confirm Modify"
causing the admin password to change.
Gaining administrative privileges allows access to the Server Management
page that shows all the server's clients, IP addresses, domain names, and
ability to access all the client's contact people, telephone numbers,
usernames, and passwords. You can also delete any sites/files or download
any sites/files. This username and password (the administrator's) also
allows full access via FTP to the site showing the root directory of the
server, and the to /log/ directory allowing you to delete any evidence
that might be stored there.
-------
AFLHI 058009990407128029/089802---(102598//991024)
http://www.indolinux.com - Nikmati Layanan Personal INDOLINUX ::
http://techscape.net/ - Webhosting: Dual T3 on Dual Pentium III 450Mhz
Only US$1.95/month -> CGI SSL 5MB Unlimited Traffic & Mail FP2000
-------------------------------------------------------------------
untuk berhenti kirim email ke [EMAIL PROTECTED]
untuk melihat peraturan kirim email ke [EMAIL PROTECTED]
arsip berada di http://www.mail-archive.com/[email protected]