what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Xymon 4.x File Deletion

Xymon 4.x File Deletion
Posted Jul 26, 2013
Authored by Henrik Stoerner

Xymon versions prior to 4.3.12 with the xymond_rrd module enabled suffer from a file deletion vulnerability.

tags | exploit
SHA-256 | 05961b9deef0e4629fab271ff5bc660e184d958c0772a463c88ba29fff50ab45

Xymon 4.x File Deletion

Change Mirror Download
Hi,

a security vulnerability has been found in version 4.x of the Xymon
Systems & Network Monitor tool (https://sourceforge.net/projects/xymon/).


Impact
------
The error permits a remote attacker to delete files on the server
running the Xymon trend-data daemon "xymond_rrd". File deletion is done
with the privileges of the user that Xymon is running with, so it is
limited to files available to the userid running the Xymon service. This
includes all historical data stored by the Xymon monitoring system.


Vulnerable versions
-------------------
All Xymon 4.x versions prior to 4.3.12 with the xymond_rrd module
enabled (this is the default configuration).

Note that Xymon was called "Hobbit" from version 4.0 to 4.2; all of the
"Hobbit" versions are also vulnerable.


Mitigating factors
------------------
The attack requires access to the xymond network port (default: tcp port
1984).

If access to administrative commands is limited by use of the
"--admin-senders" option for the "xymond" daemon, then the attack is
restricted to the commands sent from the IP-adresses listed in the
--admin-senders access list. However, the default configuration permits
these commands to be sent from any IP.

Systems where xymond_rrd is disabled are not vulnerable, but this is not
the default configuration.


Details
-------
Xymon stores historical data, trend-data etc. for each monitored host in
a set of directories below the Xymon "server/data/" directory. Each
monitored host has a set of directories named by the hostname.

When a host is no longer monitored, the data stored for the host can be
removed by sending a "drop HOSTNAME" command to the Xymon master daemon.
This is forwarded to xymond_rrd and other modules which then handle
deleting various parts of the stored data, essentially by performing the
equivalent of "rm -rf <xymondatadirectory>/rrd/HOSTNAME". In the
vulnerable versions of Xymon, the hostname sent to xymond was used
without any checking, so a hostname could include one or more "../"
sequences to delete files outside the intended directory.

There are other modules that delete files in response to a "drophost"
command, but for various reasons these are not vulnerable to the attack.


Credit and timeline
-------------------
The bug was discovered by "cleaver" during investigation of a bug
originally reported to the Xymon mailing list on July 17 -
http://lists.xymon.com/archive/2013-July/037838.html - and I was
notified via private e-mail on July 21st when it was realized to be a
security related issue.

A bugfix - r7199 - was committed to the Sourceforge SVN code repository
on July 23rd, and version 4.3.12 was released on July 24th.


Henrik Størner
Xymon developer
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close