exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

IRM Security Advisory 9

IRM Security Advisory 9
Posted Jul 28, 2004
Authored by IRM Research | Site irmplc.com

IRM Security Advisory 009 - RiSearch version 1.0.01 and RiSearch Pro 3.2.06 are susceptible to open FTP/HTTP proxying, directory listings, and file disclosure vulnerabilities.

tags | exploit, web, vulnerability
SHA-256 | 4b5da6844da14d869b8b6a8df9ddcc0734547f1dab9d149dc17dea950607f571

IRM Security Advisory 9

Change Mirror Download
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
IRM Security Advisory No. 009

RiSearch and RiSearch ProPro are vulnerable to open FTP/HTTP proxy,
directory listings and file disclosure vulnerabilities

Vulnerablity Type / Importance: Network Subversion,
Open Proxy, Brute-Force Attack

Arbitrary Filesystem Access / High

Problem discovered: July 6th 2004
Vendor contacted: July 7th 2004
Advisory published: July 27th 2004

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Abstract:
~~~~~~~~~

The RiSearch (and Pro) Suite is a set of PERL scripts that enables
users to search web sites. RiSearch (Pro) is vulnerable to an open proxy
attack that allows arbitrary access to ports via FTP and HTTP as well as
access to the remote file system (files and directory listings) outside the
web root.

Description:
~~~~~~~~~~~~

During a recent security testing engagement it was identified that
public access was granted to a script show.pl, which grabs a web page and
highlights words in it based on POST/GET variables. The functionality was
originally
designed to show and highlight pages from the target web site only.

However it was identified that no access restrictions were applied to
the script and it was possible to manipulate the variables to make requests
to
other sites, ports and files. For example, one could select: -

http://10.0.0.0/cgi-bin/search/show.pl?url=http://www.google.com

and the site would return the Google web site. Unfortunately this means
that the server is now an open proxy, and it is possible to utilise the
script
to access web servers on the net and masquerade behind the target's site,
which is very useful for analysing/attacking other servers using web
protocols.

Furthermore, it is also possible to request web sites from private IP
addresses behind the firewall, for example: -

http://10.0.0.0/cgi-bin/search/show.pl?url=http://192.168.0.1

or from another port (in this case a Tomcat admin page): -

http://10.0.0.0/cgi-bin/search/show.pl?url=http://localhost:8080

This seriously circumvents the security of any firewall infrastructure
in place protecting the hosts.

It was also observed that it was possible to gain access to services
using the FTP protocol using: -

http://10.0.0.0/cgi-bin/search/show.pl?url=ftp://192.168.0.1

Again, potentially compromising any access restrictions in place at the
network layer. It is also possible to use the script to brute-force FTP
accounts behind the firewall using the following: -

http://10.0.0.0/cgi-bin/search/show.pl?url=ftp://username:password@192.168.0
.1

Finally, it transpires that it is also possible to read any file on the
filesystem using the following URL: -

http://10.0.0.0/cgi-bin/search/show.pl?url=file:/etc/passwd

This would show the Operating System password file. Requesting only a
directory provides a handy listing.


Tested Versions:
~~~~~~ ~~~~~~~~~

RiSearch 1.0.01
RiSearch Pro 3.2.06

Tested Operating Systems:
~~~~~~ ~~~~~~~~~ ~~~~~~~~

Microsoft Windows 2000

Vendor & Patch Information:
~~~~~~ ~ ~~~~~ ~~~~~~~~~~~~

RiSearch were contacted on July 7th 2004 and released the update on
July 8th 2004, which can be downloaded from http://www.risearch.org

Workarounds:
~~~~~~~~~~~~

Deny browser access to show.pl

Credits:
~~~~~~~~

Research & Advisory: Phil Robinson, Gerald Gallagher, Kendric Tang

Disclaimer:
~~~~~~~~~~~

All information in this advisory is provided on an 'as is'
basis in the hope that it will be useful. Information Risk Management
Plc is not responsible for any risks or occurrences caused
by the application of this information.

A copy of this advisory may be found at: -

http://www.irmplc.com/advisories

The PGP key used to sign IRM advisories can be obtained from the above
URL, or from keyserver.net and its mirrors.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Information Risk Management Plc. http://www.irmplc.com
22 Buckingham Gate advisories@irmplc.com
London info@irmplc.com
SW1E 6LB
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close