TUCoPS :: Web :: Servers :: sambar1.htm

Sambar server beta - view victim's hard disk, buffer overflow, insecure script
Vulnerability

    sambar

Affected

    Win 95, NT

Description

    Michiel de  Weerd found  how Sambar  Server Beta's  have a serious
    bug.  It is possible to view  the victim's HDD.  Asume you find  a
    computer  running  Sambar  Server  by  searching the Internet with
    these key-words: +sambar +server +v4.1

    If you find a site like: http://www.site.net/ then do a test,  run
    a little perl script...

        http://www.site.net/cgi-bin/dumpenv.pl

    Now  you  see  the  complete  environment of the victims computer,
    including his path. Now you can try to login as the  administrator
    by this url:

        http://www.site.net/session/adminlogin?RCpage=/sysadmin/index.stm

    The default login is: admin and the default password is blank.  If
    the victim hasn't  changed his settings,  you now can  control his
    server.  Another feature is to view the victims HDD.  If you  were
    able to  run the  perl script  you should  also be  able (in  most
    cases)  to  view  directory's  from  his  path.  Most  people have
    c:/program files and c:/windows in the path line, so what you  can
    do is:

        http://www.site.net/c:/program files/sambar41

    There is also  a buffer overrun  in the logging  code and a  MAJOR
    hole  in  the  mailit  script  that  allow for remote execution of
    system commands.

Solution

    1) Upgrade to a non-beta version of Sambar Server.
    2) Don't  alow directory  browsing if  index.html or  default.html
       isn't found.
    3) Change  the  admin  username  and password before someone  else
       changes it for you.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH