TUCoPS :: Web :: Servers :: voyager.htm

QNX Voyager break out of web root
Vulnerability

    Voyager

Affected

    QNX Voyager 2.01B

Description

    NeonBunny found following.  This was tested on QNX Voyager  2.01B.
    Tested distributions are QNX Demo  Disk (Modem v405) and QNX  Demo
    Disk (Network v405).

    QNX is a  whole operating system  aimed at the  embedded computing
    market.  They currently have  on release  two demo  disks (One for
    network access, one for  modem access), which boast  an integrated
    web server and web browser (Voyager).

    The main problem stems from the ability to navigate the whole file
    system by using the age old ".." paths.  From the web server  root
    /../../ will take you  to the file system  root where there are  a
    number of interesting files which can be viewed...

    /etc/passwd will  not store  any useful  information (On  the demo
    disks versions anyhow), as the demo disks come with null passwords
    and  no  log  on   screen.   However,  /etc/ppp/chap-secrets   and
    /etc/ppp/pap-secrets on  the modem  build will  reveal the  recent
    connection password.

    By accessing /dev/dns the attacker will allow one more  legitimate
    page request to be served before the web server hangs.

    Due  to  the  integration  of  the  web  server and web client any
    visitor to the web server's site can view error messages  produced
    by  the  web  browser.   For  example,  the attacker could request
    http://target/dns_error.html and  be presented  with the  last DNS
    lookup failure the target received.

    The web client's settings file

        http://target/.photon/voyager/config.full

    Recently visited sites

        http://target/.photon/voyager/history.html

    The list of book-marked sites

        http://target/.photon/voyager/hotlist

    The Photon Window Manager menu listing (Equivalent to MS  Windows'
    'start menu')

        http://target/.photon/pwm/pwm.menu

    Modem set-up information.

        http://target/.photon/phdial/connection [Modem build only]

    Available screen settings

        http://target/crt.html

    Current screen setting

        http://target/../../etc/config/trap/crt.cur.1

    There is also  a small privacy  issue thanks to  the 'QNX Embedded
    Resource  Manager',  which  dynamically  produces real time system
    statistics.   Anyone  requesting  http://target/embedded.html will
    be  presented  with  computer  spec,  internet stats and a process
    list.

    While  these  holes  don't  lend  themselves  to  exploits  in the
    traditional  sense,  it  may  be  worth updating your CGI scanners
    with the previously mentioned URLs.

Solution

    Nothing yet.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH