TUCoPS :: Security App Flaws :: raptor.htm

Raptor 6.5 firewall - access unallowed ports
Vulnerability

    Raptor

Affected

    Raptor 6.5

Description

    Lysel  Christian  Emre  found  following.   The Raptor firewall is
    vulnerability for  forwarding http  request on  other port numbers
    than 80, if a rule allows  http traffic.  Redirect rules does  not
    affect this problem.

    When an extern  or internal client,  configures itself to  use the
    nearest interface as  proxy, it's possible  to access other  ports
    that 80 on the target host.

    Only the  http protocol  is allowed  and only  to a  range of  TCP
    ports: TCP, 79-99 and TCP, 200-65535.

    If a port outside this range is targeted, an Alert will be issued.

    An example of what is vulnerability could be used for:
        Setting a Raptor  firewall up, allowing  Universe to access  a
        local  web  server  (host:  webserver),  listening  on port 80
        (normal  website)  and  2000  (admin  site).   This would give
        external  users  access  to  the  admin site listening on port
        2000,  if  the  client  is  configured  to  use  the  external
        interface as a  proxy server (for  lynx: "export http_proxy  =
        http://external-interface:80/ ; lynx http://webserver:2000/").

    This works  not only  for external  users, but  also for  internal
    users.  Testing of the Secure Socket Layer has not been performed.

Solution

    1. Use httpd.noproxy in the affected rule.
    2. Downgrade to version 6.0.2
    3. Apply hotfix SG6500-20000920-00 and SG6500-20001121-00,

        ftp://ftp.axent.com/pub/RaptorFirewall/Patches/6.50/Internal/http-int.zip

    Hot Fix SG6500-20000920-00 9/20/2000
    =====================================
    If client uses firewall as proxy, firewall will forward request to
    ports other  than 80  on server.  this vulnerability  is fixed  by
    closing  all  ports  for  proxy  except  80  and port specified by
    httpd.allow_proxy_to_port_xxx=1.

    Hot Fix SG6500-20001121-00 11/21/2000
    =====================================
    This      hotfix      removes      the      implementation      of
    httpd.allow_proxy_to_port_xxx.    Without   this   implementation,
    firewall could be used as  proxy to access (inbound and  outbound)
    http ports other than 80.

    Workaround:
    1. Disable the http proxy, and  use the TCP proxy.  But  this will
       introduce other security concerns.
    2. Disable other listeners at the webserver.

    The patch can be downloaded from (for the international version):

        ftp://ftp.axent.com/pub/RaptorFirewall/International/Patches/NT6.5/

    If  you're  using  service  redirection  on the Raptor system (for
    example, for connections  to your Web  server) and you  don't want
    to allow users connecting through the Raptor system to be able  to
    use it as a proxy, create a Rule and enter the following into  the
    Advanced Services tab:

        http.noproxy

    This provides you  with more security  protection, in addition  to
    the added flexibility (vs. a packet filter or stateful  inspection
    product)  since  it  eliminates  the  need for completely shutting
    down the proxy capability of your internal Web servers.

    Additionally,  in  an  effort  to  provide  the  highest  level of
    managability and security to our customers, Raptor will  introduce
    an  enhancement  to  their  Management  Console  (GUI) whereby the
    HTTP.NOPROXY functionality will be permanently exposed.  They also
    intend to change the default to disable the HTTP proxy  capability
    on all external interfaces, and  leave it enabled on all  internal
    interfaces.   This will  provide your  security administrator  the
    option to manage the default behavior as desired while  defaulting
    to a more secure initial state "out-of-the-box".

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH