11th Feb 2002 [SBWID-5087]
COMMAND
MiniPortal remote compromise
SYSTEMS AFFECTED
MiniPortal v1.1.5 on Win2k
PROBLEM
Strumpf Noir Society [http://labs.secureance.com] says :
The FTP server coming with MiniPortal contains multiple vulnerabilities
which could be exploited by an attacker to obtain user account
information, read access to any file on the local HD and which could
lead to arbitrary code execution.
MiniPortal Plaintext Account and Session Data
MiniPortal stores its account information in plaintext .pwd files in
the miniportal/apache directory. Also, full login and session data is
stored plaintext in the file miniportal/mplog.txt. Through either
physical access to the system or by abusing below described directory
traversal problem, elevated privileges could be obtained on the system
in question by retrieving these files.
MiniPortal Directory Traversal Vulnerability
The FTP server supplied with MiniPortal does not properly restrict
access to files outside of the user directory. By using a \'triple
dot\' notation (\'.../file.ext\') an attacker can break out of this
directory and obtain read access to any file on the local disk. (This
vulnerability only seems to work on WinNT/Win2k server systems)
MiniPortal Login Buffer Overflow Vulnerability
Due to improper bounds checking, a buffer overflow condition is in
existence in one of the logging routines of said FTP server. This can
be exploited by supplying the server with overly long (>4093 bytes)
input at login. Besides crashing the FTP server, this can be exploited
to execute arbitrary code on the system.
SOLUTION
Update to MiniPortal v1.1.6 :
http://www.instantservers.com
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH