what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

nortel.htm

nortel.htm
Posted Jan 26, 2000
Site oliver.efri.hr

Nortel's new Contivity seris extranet switches give administrators the ability to enable a small HTTP server and use Nortel's web based administration utility to handle configuration and maitenance. The server runs atop the VxWorks operating system and is located in the directory /system/manage. A CGI application, /system/manage/cgi/cgiproc that is used to display the administration html pages does not properly authenticate users prior to processing requests. An intruder can view any file on the switch without logging in.

tags | exploit, web, cgi
SHA-256 | e6470da7422c75f82642fd4a9d29e044d0ee71eaad5f6c6e169743abe355b388

nortel.htm

Change Mirror Download
<!DOCTYPE HTML PUBLIC "html.dtd">
<HTML>
<BODY BGCOLOR="#000000" TEXT="#FFFFFF"><PRE>
<FONT COLOR="#CC0000">COMMAND</FONT>

Nortel's switches

<FONT COLOR="#CC0000">SYSTEMS AFFECTED</FONT>

Nortel's new Contivity seris extranet switches

<FONT COLOR="#CC0000">PROBLEM</FONT>

John Daniele found following. Nortel's new Contivity seris
extranet switches give administrators the ability to enable a
small HTTP server and use Nortel's web based administration
utility to handle configuration and maitenance. The server runs
atop the VxWorks operating system and is located in the directory
/system/manage. A CGI application, /system/manage/cgi/cgiproc
that is used to display the administration html pages does not
properly authenticate users prior to processing requests. An
intruder can view any file on the switch without logging in.

Method of exploitation? Pretty much a no brainer:
<FONT COLOR="#00FF00">
http://x.x.x.x/manage/cgi/cgiproc?Nocfile=/name/and/path/of/file.
</FONT>
(interesting places to look: /system/filelist.dat,
/system/version.dat, /system/keys, /system/core, etc.)

The only entry found in the event/security logs after exploitation
is this:
<FONT COLOR="#00FF00">
09:44:23 tEvtLgMgr 0 : Security [12] Management: Request for cgiproc denied. requires login
</FONT>
Also, this same application does not properly escape
metacharacters such as '$', '!', resulting in total system crash:
<FONT COLOR="#00FF00">
http://x.x.x.x/manage/cgi/cgiproc?$
</FONT>
Nothing is found in the security/event logs after reboot. This
was tested on a Contivity 2500 running version 2.6 of the VxWorks
OS. However, the cgiproc application has been (guess) part of the
package since their initial release, therefore earlier versions
may also be affected.

<FONT COLOR="#CC0000">SOLUTION</FONT>

Nortelwas contacted and opened a case (CR# 118887 - cgiproc 'bug',
CR# 118890 - DoS). A patch has been developed and is scheduled to
be released with their next shipment of the VxWorks package.
Those administrators that have properly configured the switch, and
placed adequate access control/filtering rules on the managemnt
virtual ip should not have any immediate concerns.
</PRE></BODY>
</HTML>
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close