rt-sa-2007-001.txt

2007-09-18T00:00:00
ID PACKETSTORM:59383
Type packetstorm
Reporter redteam-pentesting.de
Modified 2007-09-18T00:00:00

Description

                                        
                                            `Advisory: Alcatel-Lucent OmniPCX Remote Command Execution  
  
RedTeam Pentesting discovered a remote command execution in the  
Alcatel-Lucent OmniPCX during a penetration test. The masterCGI script  
of the OmniPXC integrated communication solution web interface is  
vulnerable to a remote command execution. Attackers can run arbitrary  
commands with the permissions of the web application user.  
  
  
Details  
=======  
  
Product: Alcatel-Lucent OmniPCX  
Affected Versions: All versions up to and including R7.1  
Fixed Versions: All supported versions  
Vulnerability Type: Remote Command Execution  
Security-Risk: high  
Vendor-URL: http://www1.alcatel-lucent.com/psirt/statements.htm  
reference number 2007002  
Vendor-Status: Informed, patch available  
Advisory-URL: http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php  
Advisory-Status: public  
CVE: CVE-2007-3010  
CVE-URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3010  
  
  
Introduction  
============  
  
"The OmniPCX Enterprise is an integrated communications solution for  
medium-sized businesses and large corporations. It combines the best of  
the old (legacy TDM phone connectivity) with the new (a native IP  
platform and support for Session Initiation Protocol, or SIP) to provide  
an effective and complete communications solution for cost-conscious  
companies on the cutting edge."  
  
(from the vendor's homepage)  
  
  
More Details  
============  
  
The OmniPCX web interface has a CGI script "masterCGI" which offers a  
"ping" functionality. By running the script with the parameters "ping"  
and "user", one is able to ping any IP address reachable from the server  
the webinterface is running on.  
  
curl -k "https://www.example.com/cgi-bin/masterCGI?ping=nomip&user=127.0.0.1"  
  
The ping will be done on the server, running the ping program installed  
on it. The vulnerability lies in the "user" variable not being filtered  
when passed to the shell. Thus, arbitrary commands can be executed on  
the server by adding them to the user variable, separated by semicolons.  
Spaces have to be encoded by using the internal field separator ${IFS},  
as any normal or URL encoded space will abort the command execution.  
  
  
Proof of Concept  
================  
  
curl -k "https://www.example.com/cgi-bin/masterCGI?ping=nomip&user=;ls\${IFS}-l;"  
  
  
Workaround  
==========  
  
Deactivate the Web server at the loss of some functionality not related  
to telephony service. Interpose a firewall allowing access to the web  
interface of the OXE to IP addresses who should have access to the  
server (e.g. maintenance technicians).  
  
  
Fix  
===  
  
Correct filtering of shell meta-characters and tighter access control  
have been implemented in all supported versions.  
  
  
Security Risk  
=============  
  
The risk of this vulnerability is high. Any user which has access to the  
web interface of the OmniPCX Enterprise solution will be able to execute  
arbitrary commands on the server with the permissions of the webserver.  
  
  
History  
=======  
  
2007-05-07 First contact with head of technical staff of Alcatel-Lucent.   
Will relay the information to their technicians and call back   
with further information.  
2007-05-09 Response with a pointer to the Alcatel-Lucent PSIRT and the  
website http://www1.alcatel-lucent.com/psirt, where the  
process of reporting a security vulnerability is explained.  
The advisory gets mailed to the email address provided there.  
2007-05-10 Advisory gets acknowledged by the PSIRT  
2007-05-23 Vulnerability gets confirmed by Alcatel-Lucent  
2007-06-18 CVE number assigned  
2007-09-17 Coordinated public release with Alcatel-Lucent  
  
  
References  
==========  
  
http://www1.alcatel-lucent.com/psirt/statements.htm  
reference number 2007002  
  
  
RedTeam Pentesting GmbH  
=======================  
  
RedTeam Pentesting is offering individual penetration tests, short  
pentests, performed by a team of specialised IT-security experts.  
Hereby, security weaknesses in company networks or products are  
uncovered and can be fixed immediately.  
  
As there are only few experts in this field, RedTeam Pentesting wants to  
share its knowledge and enhance the public knowledge with research in  
security related areas. The results are made available as public  
security advisories.  
  
More information about RedTeam Pentesting can be found at  
http://www.redteam-pentesting.de.  
  
--   
RedTeam Pentesting GmbH Tel.: +49 241 963-1300  
Dennewartstr. 25-27 Fax : +49 241 963-1304  
52068 Aachen http://www.redteam-pentesting.de/  
Germany Registergericht: Aachen HRB 14004  
Geschäftsführer: Patrick Hof, Jens Liebchen, Claus R. F. Overbeck  
`