4th Apr 2002 [SBWID-5238]
COMMAND
Cisco ACS web interface vulnerabilities
SYSTEMS AFFECTED
The affected product is Cisco Secure Access Control Server for Windows
releases 2.6.x and ACS 3.0.1 (build 40).
PROBLEM
In Cisco Security Advisory [http://
www.cisco.com/warp/public/707/ACS-Win-Web.shtml] :
There are two different vulnerabilities, as described by the Bug IDs
below. The first can lead to execution of an arbitrary code and the
second can be used to reveal customer data.
* By connecting to a port 2002 and sending a crafted URL it is possible
to, in a less severe case, kill the CSADMIN module or, in a severe
case, to execute an arbitrary user supplied code. The functionality of
authentication, authorization, and accounting (AAA) is not affected by
termination of the CSADMIN module. This means that users will be able
to authenticate normally. Only the administration function will be
affected. Port 2002 is used by the CSADMIN module for remote
administration.
By providing an URL containing formatting symbols (for example, %s, %p)
it is possible to execute an user provided code. This technique is
described in the following article:
http://www.securityfocus.com/archive/1/66842
This vulnerability is documented as Cisco Bug IDs CSCdx17622 and
CSCdx17683.
By exploiting the format vulnerability an attacker may execute the
arbitrary code on the machine. This code will be executed in the same
context as the CSADMIN process, and that is Administrator. Executing
arbitrary code will lead to a total compromise of the machine.
* The another vulnerability can lead to unauthorized disclosure of
data. By using \"..\\..\" in the URL it is possible to access data in
any directory outside the Web root directory but on the same hard disk
or disk partition. With this technique it is possible to access only
the following file types: html, htm, class, jpg, jpeg or gif.
Please note that an attacker must know the exact location and file
name. It is not possible to browse a directory this way.
This vulnerability is documented as Cisco Bug IDs CSCdx17689 and
CSCdx17698.
By exploiting the directory traversal vulnerability an attacker can
gain an unauthorized access to information in on of the following file
types: html, htm, class, jpg, jpeg or gif. The main issue may be html
files with hardcoded passwords or other sensitive information.
Exploit :
======
This is based on iXsecurity Security Vulnerability Report
[http://www.ixsecurity.com] by Patrik Karlsson.
Cisco Secure ACS has a webserver interface listening on port 2002. It
is possible for a logged in user to read files outside the webdirect
ory. After a succesfull login, one could supply eg.
http://<ip>:<dynamicport>/..\\..\\..\\..\\..\\..\\temp\\temp.class
To read the contents of the file temp.class in the folder temp on the
same volume that the software is installed.
-or-
http://servername:9090///
SOLUTION
Both vulnerabilities are fixed by the patched CSAdmin.exe file
available at:
http://www.cisco.com/cgi-bin/tablebuild.pl/cs-acs-win
The file names are: CSAdmin-patch-2.6-4-4.zip and
CSAdmin-patch-3.0-1-40.zip.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH