TUCoPS :: SunOS/Solaris :: sun5269.htm

Raptor Firewall FTP Bounce vulnerability
17th Apr 2002 [SBWID-5269]
COMMAND

	Raptor Firewall FTP Bounce vulnerability

SYSTEMS AFFECTED

	Tested on Raptor 6.5.3i on Sun Solaris 7

PROBLEM

	Roy  Hills  [http://www.nta-monitor.com/]  found   following   regarding
	Raptor Firewall :
	

	The Raptor Firewall can make an FTP server behind it vulnerable  to  the
	well-known FTP bounce vulnerability even if the FTP server used  is  not
	susceptible to this issue.
	

	 Overview

	 ========

	

	While performing a penetration test for a customer, we  discovered  that
	their FTP server was vulnerable to  the  well-known  FTP  Bounce  attack
	from the Internet. However, subsequent conversation  with  the  customer
	showed that the FTP server itself (a recent version of wu-ftp)  was  not
	vulnerable to the FTP bounce attack.
	

	It appears that the Raptor Firewall\'s FTP proxy was somehow making  the
	FTP server vulnerable to the FTP bounce vulnerability  even  though  the
	FTP server itself was immune to this problem.
	

	The Firewall vendor (Symantec) have been informed of this issue.
	

	 Environment

	 ===========

	

	

	 Firewall:	Raptor 6.5.3i on Sun Solaris 7

	 FTP Server:	wu-ftpd on internal network with anonymous access

	 Config:	Using built-in Raptor FTP proxy for inbound FTP access from Internet

	

	

	 Analysis

	 ========

	

	We verified and analysed the vulnerability using the following setup:
	

	1. \"attacker\" - A Linux system on the Internet that  connects  to  the
	FTP server and exploits the vulnerability
	

	2. \"victim\" - A second Linux  system  on  the  Internet  that  is  the
	target of the bounce attack
	

	3. \"server\" - The FTP server. External address 194.217.26.147,  internal
	10.1.13.5
	

	4.  \"Firewall\" - The Raptor Firewall
	

	We verified the FTP bounce vulnerability from the Internet and used  the
	\"tcpdump\" packet sniffer on the Internet  \"attacker\",  the  Internet
	\"victim\" (target  of  the  ftpbounce  test)  and  the  FTP  server  to
	determine what was going on.
	

	It turns  out  that  the  Raptor  Firewall  re-writes  the  inbound  FTP
	\"PORT\" command and changes the IP  address  to  be  the  Hacker\'s  IP
	rather than the Victim\'s, and the port number to be  another  ephemeral
	port. This means that the  FTP  server  cannot  detect  the  FTP  bounce
	attack because it sees the correct IP address (the  one  of  the  hacker
	rather than the victim) and an ephemeral port.  However,  when  the  FTP
	Server makes the outbound connection to this IP address  and  port,  the
	Firewall re-writes the IP address and port in the packet to  be  the  IP
	address and port of the victim which was  originally  specified  by  the
	Hacker.
	

	Thus, the Raptor Firewall prevents the FTP  Server  from  detecting  the
	FTP bounce attack, and permits the attack to  take  place.  Because  the
	FTP Server will always see the \"correct\" IP address and  port  in  the
	PORT command, it cannot determine that an FTP  bounce  attack  is  being
	carried out and will accept the command.
	

	 Further information

	 ===================

	

	Further information, including annotated \"tcpdump\" packet  traces  are
	available at:
	

	

	http://www.nta-monitor.com/news/raptor-set.htm

	

	

SOLUTION

	Nothing yet.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH