TUCoPS :: Web :: Apps :: bt35.txt

CGIWrap Format strings vuln




A locally and possibly remotely exploitable format

strings bug exists 

in cgiwrap available from  

http://cgiwrap.sourceforge.net/

http://sourceforge.net/projects/cgiwrap

http://www.freebsd.org/ports/security.html 



I. BACKGROUND



This is CGIWrap - a gateway that allows more secure

user access to

CGI programs on an HTTPd server than is provided by the

http server

itself. The primary function of CGIWrap is to make

certain that

any CGI script runs with the permissions of the user

who installed

it, and not those of the server.



CGIWrap works with NCSA httpd, Apache, CERN httpd,

NetSite Commerce

and Communications servers, and probably any other Unix

based web

server software that supports CGI.



II. DESCRIPTION



On line 91 of msgs.c the printf() function is used

incorrectly. Which 

results

in a format strings vulnerability.

<snip>

void MSG_Error_General(char *message)

{

        MSG_Header("CGIWrap Error", message);

        printf(message); 

        MSG_Footer();

        exit(1);

}

</snip>



The binaries in cgiwrap, (cgiwrap and nph-cgiwrap) are

installed setuid 

root.

Thus could make this format problem exploitable locally

to gain root 

privs or

possably remotely to gain root or the privs of the user

who owns the cgi 

script.



III. ANALYSIS

An attacker could exploit this issue to escalate privs

locally or 

remotely on

a server running cgiwrap.



IV. DETECTION



This is vulnerable in the latest version of cgiwrap

version 3.7.1 and 

properly

older versions(not checked). It would be exploitable on

any Linux/Unix 

based OS

running cgiwrap 



V. VENDOR

The vendor has not been contacted about this issue.



Regards

b0f  (Alan M)

www.b0f.net

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH