TUCoPS :: Windows Apps :: win5238.htm

Cisco ACS web interface vulnerabilities
4th Apr 2002 [SBWID-5238]
COMMAND

	Cisco ACS web interface vulnerabilities

SYSTEMS AFFECTED

	The affected product is Cisco Secure Access Control Server  for  Windows
	releases 2.6.x and ACS 3.0.1 (build 40).

PROBLEM

	In          Cisco          Security          Advisory           [http://
	www.cisco.com/warp/public/707/ACS-Win-Web.shtml] :
	

	There are two different vulnerabilities, as described  by  the  Bug  IDs
	below. The first can lead to execution of  an  arbitrary  code  and  the
	second can be used to reveal customer data.
	

	* By connecting to a port 2002 and sending a crafted URL it is  possible
	to, in a less severe case, kill the  CSADMIN  module  or,  in  a  severe
	case, to execute an arbitrary user supplied code. The  functionality  of
	authentication, authorization, and accounting (AAA) is not  affected  by
	termination of the CSADMIN module. This means that users  will  be  able
	to authenticate normally.  Only  the  administration  function  will  be
	affected.  Port  2002  is  used  by  the  CSADMIN  module   for   remote
	administration.
	   

	By providing an URL containing formatting symbols (for example, %s,  %p)
	it is possible to execute an  user  provided  code.  This  technique  is
	described          in          the          following           article:
	http://www.securityfocus.com/archive/1/66842
	   

	This vulnerability  is  documented  as  Cisco  Bug  IDs  CSCdx17622  and
	CSCdx17683.
	

	By exploiting the format  vulnerability  an  attacker  may  execute  the
	arbitrary code on the machine. This code will be executed  in  the  same
	context as the CSADMIN process, and  that  is  Administrator.  Executing
	arbitrary code will lead to a total compromise of the machine.
	

	* The another vulnerability  can  lead  to  unauthorized  disclosure  of
	data. By using \"..\\..\" in the URL it is possible to  access  data  in
	any directory outside the Web root directory but on the same  hard  disk
	or disk partition. With this technique it is  possible  to  access  only
	the following file types: html, htm, class, jpg, jpeg or gif.
	   

	Please note that an attacker must  know  the  exact  location  and  file
	name. It is not possible to browse a directory this way.
	   

	This vulnerability  is  documented  as  Cisco  Bug  IDs  CSCdx17689  and
	CSCdx17698.
	

	By exploiting the directory  traversal  vulnerability  an  attacker  can
	gain an unauthorized access to information in on of the  following  file
	types: html, htm, class, jpg, jpeg or gif. The main issue  may  be  html
	files with hardcoded passwords or other sensitive information.
	

	

	 Exploit : 

	 ======

	

	This   is   based   on   iXsecurity   Security   Vulnerability    Report
	[http://www.ixsecurity.com] by Patrik Karlsson.
	

	Cisco Secure ACS has a webserver interface listening on  port  2002.  It
	is possible for a logged in user to read  files  outside  the  webdirect
	ory. After a succesfull login, one could supply eg.
	

	http://<ip>:<dynamicport>/..\\..\\..\\..\\..\\..\\temp\\temp.class 

	

	To read the contents of the file temp.class in the folder  temp  on  the
	same volume that the software is installed.
	

	-or-
	

	

	http://servername:9090///

	

SOLUTION

	Both  vulnerabilities  are  fixed  by  the  patched   CSAdmin.exe   file
	available at:
	

	http://www.cisco.com/cgi-bin/tablebuild.pl/cs-acs-win

	

	The     file     names      are:      CSAdmin-patch-2.6-4-4.zip      and
	CSAdmin-patch-3.0-1-40.zip.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH