[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : Vulnerability in webdist.cgi

Title: Vulnerability in webdist.cgi
Released by: CERT
Date: 6th May 1997
Printable version: Click here
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1





=============================================================================

CERT* Advisory CA-97.12

Original issue date: May 6, 1997

Last Revised: September 26, 1997

              Updated copyright statement



              A complete revision history is at the end of this file.





Topic: Vulnerability in webdist.cgi

- -----------------------------------------------------------------------------



The CERT Coordination Center has received reports of a security

vulnerability in the webdist.cgi cgi-bin program, part of the IRIX

Mindshare Out Box package, available with IRIX 5.x and 6.x. By exploiting

this vulnerability, both local and remote users may be able to execute

arbitrary commands with the privileges of the httpd daemon. This may be

used to compromise the http server and under certain configurations gain

privileged access.



Vendor patches are now available from Silicon Graphics Inc. We encourage you

to apply patches as soon as possible. For more information, refer to the

Silicon Graphics Inc. Security Advisory Number 19970501-02-PX.



The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its

mirror, ftp.sgi.com.  Security information and patches can be found in

the ~ftp/security and ~ftp/patches directories, respectively.



We will update this advisory as we receive additional information.

Please check our advisory files regularly for updates that relate to your

site.



Note: Development of this advisory was a joint effort of the CERT Coordination

      Center and AUSCERT. This material was also released as AUSCERT advisory

      AA-97.14.

- -----------------------------------------------------------------------------



I.   Description



     A security vulnerability has been reported in the webdist.cgi cgi-bin

     program available with IRIX 5.x and 6.x. webdist.cgi is part of the

     IRIX Mindshare Out Box software package, which allows users to install

     software over a network via a World Wide Web interface.



     webdist.cgi allows webdist(1) to be used via an HTML form interface

     defined in the file webdist.html, which is installed in the default

     document root directories for both the Netsite and Out Box servers.



     Due to insufficient checking of the arguments passed to webdist.cgi, it

     may be possible to execute arbitrary commands with the privileges of

     the httpd daemon. This is done via the webdist program.



     When installed, webdist.cgi is accessible by anyone who can connect to

     the httpd daemon. Because of this, the vulnerability may be exploited by

     remote users as well as local users. Even if a site's webserver is

     behind a firewall, it may still be vulnerable.



     Determining if your site is vulnerable

     --------------------------------------

     All sites are encouraged to check their systems for the IRIX Mindshare

     Out Box software package, and in particular the Webdist Software

     package which is a subsystem of the Mindshare Out Box software

     package. To determine if this package is installed, use the command:



     # versions outbox.sw.webdist



     I = Installed, R = Removed



     Name                   Date        Description



     I outbox               11/06/96    Outbox Environment, 1.2

     I outbox.sw            11/06/96    Outbox End-User Software, 1.2

     I outbox.sw.webdist    11/06/96    Web Software Distribution Tools, 1.2





II.  Impact



     Local and remote users may be able to execute arbitrary commands on

     the HTTP server with the privileges of the httpd daemon. This may be

     used to compromise the http server and under certain configurations

     gain privileged access.





III. Solution



     Vendor patches are available from Silicon Graphics Inc. We encourage you

     to apply patches as soon as possible. For more information, refer to the

     Silicon Graphics Inc. Security Advisory Number 19970501-02-PX, which is

     available from the SGI anonymous FTP site



        http://sgigate.sgi.com



     or its mirror,



        http://ftp.sgi.com



     Security information and patches can be found in the ~ftp/security and

     ~ftp/patches directories, respectively.



     You can also prevent the exploitation of this vulnerability by applying

     the workaround given in Section III.A or removing the package from your

     systems (Section III.B).





     A. Remove execute permissions



     Sites should immediately remove the execute permissions on the

     webdist.cgi program to prevent its exploitation. By default, webdist.cgi

     is found in /var/www/cgi-bin/, but sites should check all cgi-bin

     directories for this program.



        # ls -l /var/www/cgi-bin/webdist.cgi

        -rwxr-xr-x  1 root  sys  4438 Nov  6 12:44 /var/www/cgi-bin/webdist.cgi



        # chmod 400 /var/www/cgi-bin/webdist.cgi



        # ls -l /var/www/cgi-bin/webdist.cgi

        -r--------  1 root  sys  4438 Nov  6 12:44 /var/www/cgi-bin/webdist.cgi





     Note that this will prevent all users from using the webdist

     program from the HTML form interface.





     B. Remove outbox.sw.webdist subsystem



     If the Webdist software is not required, we recommend that sites remove

     it completely from their systems. This can be done with the command:



        # versions remove outbox.sw.webdist



     Sites can check that the package has been removed with the command:



        # versions outbox.sw.webdist





IV.  Additional Measures



    Sites should consider taking this opportunity to examine their entire

    httpd configuration. In particular, all CGI programs that are not

    required should be removed, and all those remaining should be examined

    for possible security vulnerabilities.



    It is also important to ensure that all child processes of httpd are

    running as a non-privileged user. This is often a configurable option.

    See the documentation for your httpd distribution for more details.



    Numerous resources relating to WWW security are available. The following

    pages may provide a useful starting point. They include links describing

    general WWW security, secure httpd setup, and secure CGI programming.



        The World Wide Web Security FAQ:

                http://www-genome.wi.mit.edu/WWW/faqs/www-security-faq.html



        NSCA's "Security Concerns on the Web" Page:

                http://hoohoo.ncsa.uiuc.edu/security/



    The following book contains useful information including sections on

    secure programming techniques.



        _Practical Unix & Internet Security_, Simson Garfinkel and

        Gene Spafford, 2nd edition, O'Reilly and Associates, 1996.



    Please note that the CERT/CC and AUSCERT do not endorse the URLs that

    appear above. If you have any problems with these sites, please contact

    the site administrator.





- -----------------------------------------------------------------------------

This advisory is a collaborative effort between AUSCERT and the CERT

Coordination Center. This material was also released as AUSCERT advisory

AA-97.14.



We thank Yuri Volobuev for reporting this problem. We also thank Martin

Nicholls (The University of Queensland) and Ian Farquhar for their assistance

in further understanding this problem and its solution.

- -----------------------------------------------------------------------------



If you believe that your system has been compromised, contact the CERT

Coordination Center or your representative in the Forum of Incident Response

and Security Teams (see http://www.first.org/team-info/)





CERT/CC Contact Information

- ----------------------------

Email    cert@cert.org



Phone    +1 412-268-7090 (24-hour hotline)

                CERT personnel answer 8:30-5:00 p.m. EST(GMT-5) / EDT(GMT-4)

                and are on call for emergencies during other hours.



Fax      +1 412-268-6989



Postal address

         CERT Coordination Center

         Software Engineering Institute

         Carnegie Mellon University

         Pittsburgh PA 15213-3890

         USA



Using encryption

   We strongly urge you to encrypt sensitive information sent by email. We can

   support a shared DES key or PGP. Contact the CERT/CC for more information.

   Location of CERT PGP key

         http://info.cert.org/pub/CERT_PGP.key



Getting security information

   CERT publications and other security information are available from

        http://www.cert.org/

        http://info.cert.org/pub/



   CERT advisories and bulletins are also posted on the USENET newsgroup

        comp.security.announce



   To be added to our mailing list for advisories and bulletins, send

   email to

        cert-advisory-request@cert.org

   In the subject line, type

        SUBSCRIBE  your-email-address



- ------------------------------------------------------------------------------



Copyright 1997 Carnegie Mellon University. Conditions for use, disclaimers,

and sponsorship information can be found in

http://www.cert.org/legal_stuff.html and http://ftp.cert.org/pub/legal_stuff .

If you do not have FTP or web access, send mail to cert@cert.org with

"copyright" in the subject line.



CERT is registered in the U.S. Patent and Trademark Office.



- ---------------------------------------------------------------------------



This file: http://info.cert.org/pub/cert_advisories/CA-97.12.webdist

           http://www.cert.org

               click on "CERT Advisories"





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Revision history



Seo. 26, 1997  Updated copyright statement



May 07, 1997  Introduction - Corrected the AUSCERT advisory number.

              Acknowledgments - Corrected the AUSCERT advisory number

              and removed a company name.



August 27, 1997  Introduction and Solution - Added patch information.









-----BEGIN PGP SIGNATURE-----

Version: PGP for Personal Privacy 5.0

Charset: noconv



iQA/AwUBOBS/oVr9kb5qlZHQEQJH6gCcCHGzQgnNfYSjicm+/FyPYgl9QDUAnRw7

kPCHmlN28VHzXM9T30jQT8QI

=Xc4H

-----END PGP SIGNATURE-----








(C) 1999-2000 All rights reserved.