what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Sybase EAServer 6.3.1 Directory Traversal / XXE Injection / Command Execution

Sybase EAServer 6.3.1 Directory Traversal / XXE Injection / Command Execution
Posted Jul 19, 2013
Authored by Gerhard Wagner | Site sec-consult.com

Sybase EAServer versions 6.3.1 and below suffer from directory traversal, XML entity injection, and OS command execution vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 9a7fc5b427a418fe68dc14cad397d8ec6b9a5eb65ce69a35e2127e97aa52bf08

Sybase EAServer 6.3.1 Directory Traversal / XXE Injection / Command Execution

Change Mirror Download
SEC Consult Vulnerability Lab Security Advisory < 20130719-0 >
=======================================================================
title: Multiple vulnerabilities
product: Sybase EAServer
vulnerable version: <=6.3.1
fixed version: vendor did not supply version information
CVE number: -
impact: critical
homepage: www.sybase.com
found: 10/2012
by: Gerhard Wagner, Bernhard Mueller
SEC Consult Vulnerability Lab
https://www.sec-consult.com
=======================================================================

Vendor description:
-------------------
Sybase EAServer fully supports all the Web services standards and enables
enterprises to rapidly expose business functions as Web services. EAServer also
provides a graphical interface to automate the publication and management of
your company’s Web services. Today, EAServer supports EJB and Java/CORBA
components, CICS integrator, and database stored procedures. These stored
procedures can be from all Sybase’s databases including ASE, SQL Anywhere,
and IQ; in addition, they will support IBM, Oracle, and Microsoft. EAServer can
also support iAnywhere messaging services, enabling the developer to expose
these components as Web services.


Business recommendation:
------------------------
The default applications that are deployed by default during the installation
of Sybase EAServer should be removed. Further, it is recommended to test the
patches provided by Sybase.


Vulnerability overview/description:
-----------------------------------
1) Directory traversal
In order to use a common web server such as IIS as a fronted and forward only
certain requests to the Sybase EAServer it is a common practice to install and
configure the EAServer redirector plug-in. An incoming request will be received
by the web server, validated if it matches any context configured within the
redirector plug-in and if so forwarded to the appropriate application context.
So a request such as the following will be forwarded by the redirector plug-in
in case the configuration contains such an application.

https://example.com/myapp -> https://myEAServer/myapp

If the request contains a path like "/\.." the redirector plug-in is not
normalising the path as a part of the "myapp" application. Therefore, the
request will be passed on to the Sybase EAServer where backslash as well as
forward slash are valid directory separators and therefore using such a method
it is possible to access all deployed applications.

https://example.com/myapp/%5C../another_application


2) XML entity injection
Due to insufficient input validation it is possible to pass external entity
definitions to the server-side XML processor for REST requests with an XML
media type. By calling the built-in function testDataTypes() an attacker can
list directories and display arbitrary files on the affected system, as long as
the files don't conflict with the UTF-8 encoding.


3) OS command execution
The WSH service allows to run OS commands and it can only be accessed providing
administrative credentials. Using the XXE vulnerability mentioned before it is
potentially possible to retrieve the credentials from configuration files and
run OS commands using the WSH service.



Proof of concept:
-----------------
1) Directory traversal
The following request allows to access the Sybase EAServer management
application:

https://example.com/myapp/%5C../console/Login.jsp

Also the other applications that come by default with Sybase EAServer can be
accessed using their respective context for example:

/rest
/wsh
/wsf
...



2) XML entity injection
The following XML message displays the contents of the drive C: on a Windows
system:

<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [
<!ELEMENT foo ANY >
<!ENTITY xxe SYSTEM "file:///C:\">]>

<lol>
<dt>
<stringValue>&xxe;</stringValue>
<booleanValue>0</booleanValue>
</dt>
</lol>



3) OS command execution
Due to the potential impact the proof-of-concept has been removed.


Vulnerable / tested versions:
-----------------------------
The issues have been tested in Sybase EAServer 6.3.1 on Windows.


Vendor contact timeline:
------------------------
2013-03-11: Contact the vendor and provide vulnerability information
2013-06-11: Vendor fixes the issues
2013-06-28: Agreement on disclosure date 2013-07-19
2013-07-19: Public disclosure


Solution:
---------
According to the vendor customers can download the latest patches from
http://www.sybase.com/downloads. The patches have not been tested by
SEC Consult.


Advisory URL:
-------------
https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Vulnerability Lab

SEC Consult
Vienna - Bangkok - Frankfurt/Main - Montreal - Singapore - Vilnius

Headquarter:
Mooslackengasse 17, 1190 Vienna, Austria
Phone: +43 1 8903043 0
Fax: +43 1 8903043 15

Mail: research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult

EOF G. Wagner / @2013


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close