TUCoPS :: Web :: e-commerce, shopping carts :: carell~1.htm

Carello E-Commerce for NT 1.2.1 - Execute arbitrary code with Web Server privileges
Vulnerability

    Carello E-Commerce

Affected

    Carello E-Commerce V1.2.1 for Windows NT

Description

    Following is based on a Defcom Labs Advisory def-2001-25 by  Peter
    Grundl.  A  malicious user can  execute arbitrary commands  on the
    E-Commerce server with the privileges of the web server.

    The Carello.dll  utilizes full  physical path  to execute  Carello
    scripts instead  of paths  relative to  the webroot.   Some  input
    validation  has  been  inserted  in  the  program,  but  not  to a
    sufficient degree, as can be seen from the following example:

        http://foo.org/scripts/Carello/Carello.dll?CARELLOCODE=SITE2&VBEXE=C:\..\winnt\system32\cmd.exe%20/c%20echo%20test>c:\defcom.txt

    The example will  result in INETINFO.EXE  spiking at 100%  CPU and
    the  web  server  will  no  longer  answer  HTTP  requests.    The
    webservice can not be  stopped/restarted and the server  will need
    to  be  rebooted  to  regain  functionality.   The command will be
    executed  with  the  privileges  of  the  web  server, which, when
    dealing with IIS, usually means LocalSystem Access.

    The test was performed on a Windows NT 4.0 Server with SP 6a.

Solution

    Pacific  Software  Publishing,  Inc.  has  released version 1.3 to
    correct the problem and introduce  support for Windows 2000.   You
    can download it at http://www.carelloweb.com

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH