what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

tcambof.txt

tcambof.txt
Posted Feb 25, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

TrackerCam versions 5.12 and below are susceptible to a User-Agent buffer overflow, PHP argument buffer overflow, directory traversal, path disclosure, html injection to its log file, information disclosure, and remote denial of service flaws.

tags | exploit, remote, denial of service, overflow, php, info disclosure
SHA-256 | 8306b09e3c8f0acd60d146d50857d197c34a8af01ed35b3319dea96dae7af9e0

tcambof.txt

Change Mirror Download

#######################################################################

Luigi Auriemma

Application: TrackerCam
http://www.trackercam.com
Versions: <= 5.12
Platforms: Windows
Bugs: A] User-Agent buffer-overflow
B] PHP argument buffer-overflow
C] directory traversal and full path disclosure
D] html injection in log file
E] informations disclosure
F] crash caused by multiple error messages
Exploitation: remote
Date: 18 Feb 2005
Author: Luigi Auriemma
e-mail: aluigi@autistici.org
web: http://aluigi.altervista.org


#######################################################################


1) Introduction
2) Bugs
3) The Code
4) Fix


#######################################################################

===============
1) Introduction
===============


TrackerCam is a webcam http server with the possibility to be
publically and easily visible through the TrackerCam community page:
http://www.trackercam.com/livecams


#######################################################################

=======
2) Bugs
=======

-----------------------------
A] User-Agent buffer-overflow
-----------------------------

An HTTP request containing an User-Agent field longer than 216 bytes
leads to a buffer-overflow.


-------------------------------
B] PHP argument buffer-overflow
-------------------------------

As above but this buffer-overflow happens when the server handles an
argument longer than 256 bytes passed to any PHP script.
Example:
http://host:8090/MessageBoard/messages.php?aaaaaaaaaaa...aaaa


-----------------------------------------------
C] directory traversal and full path disclosure
-----------------------------------------------

TrackerCam has a PHP script accessible by anyone (bug E) that is used
to watch the log files from the web interface.
The problem is that the log filename is passed through a PHP argument
and there are no security checks in the script so an attacker can
choose what file to read and moreover from what location since is
possible to use a directory traversal attack.
If the file doesn't exist or no arguments are passed will be showed the
full physical path on which is located the ComGetLogFile.php3 script.
Both slash, backslash and their hex values are allowed.
Example:

http://host:8090/tuner/ComGetLogFile.php3?fn=../../../../windows/system.ini


-----------------------------
D] html injection in log file
-----------------------------

Any login (correct or wrong) is logged in the current log file of the
month. As already said this file is also visible through a web browser
allowing an attacker to put HTML or any other code supported by the
admin's browser in the log file through a login request.


--------------------------
E] informations disclosure
--------------------------

As said in bug C, is possible to reach the ComGetLogFile.php3 script
without restrictions in fact also the servers protected by passwords
have ever some interesting zones accessible by anyone and the log file
is just one of those, or at least that causing a threat.
In this file in fact are logged both wrong and correct logins so is
possible to guess the working passwords (that naturally are not stored
in the file), know what IP addresses have accessed the server or
retrieve other small informations.
Each log file contains the logins of the entire month so an example of
log filename for the current month is:
http://host:8090/tuner/ComGetLogFile.php3?fn=Eye2005_02.log


------------------------------------------
F] crash caused by multiple error messages
------------------------------------------

If the server receives a negative Content-Length, it will show a simple
MessageBox with an "insufficient memory" error and the same happens for
any subsequent bad request like that.
After about 300 of these consecutive errors the server crashs.

Another similar problem (just to take note, but not so important)
happens after the sending of about 10 megabytes of data.


#######################################################################

===========
3) The Code
===========


http://aluigi.altervista.org/poc/tcambof.zip


#######################################################################

======
4) Fix
======


No fix.
The developers don't seem interested to fix these bugs.


#######################################################################


---
Luigi Auriemma
http://aluigi.altervista.org

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close