TUCoPS :: Web :: Servers :: httpd1~1.htm

OmniHTTPd DoS, Show-source
Vulnerability

    OmniHTTPd

Affected

    OmniHTTPd

Description

    Following is based on a  403 Security Lab Advisory 403-05-2001  by
    Astral.  In  addition to Standard  CGI support, the  server sports
    advanced   features   such   as   Keep-Alive   connections,  table
    auto-indexing and server-side includes.  For maximum  performance,
    OmniHTTPd is both 32-bit and multi-threaded.

    PHP is an open source, server-side, cross-platform, HTML  embedded
    scripting language.   PHP is  a good  alternative to  ASP  because
    native support is  not limited to  servers running IIS  on Windows
    NT.  The PHP libraries provide good support for tasks like SQL and
    LDAP operations.

    OmniHTTPd  supports  PHP  scripts  but  it has two vulnerabilites.
    Both are connected with way OmniHTTPd processes them.

    If  malicious  user  sends  lot  requests  to  some  existing   or
    non-existing PHP script on web-server it will consume 100% percent
    of processor speed.  Why this happens?

    Every  time  you  send  request  for  PHP script, OmniHTTPd server
    starts PHP.exe and then tries to run script rather then making  it
    memory-resident.  Severity: d.o.s.

    We have  also scripts  source disclosure.   This one  is much more
    dangerous.   It allows  anyone to  view source  of scripts.   This
    vulnerability is similar to ones Microsoft had problems with.

    It is possible to make OmniHTTPd think .php;.shtml;.pl is ordinary
    HTML document.  How ?

    By  adding  space  UNICODE  character  which is %20 OmniHTTPd will
    identify any script  as HTML file  and it will  send script source
    back to client.  Exploit:

        GET /somefuckingboringphpscript.php%20% 20 HTTP/1.1

    Severity: Disclosure of script source

Solution

    Vendor didn't response so far.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH