what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

radware AppWall Source Disclosure

radware AppWall Source Disclosure
Posted Jul 1, 2009
Authored by Michael Kirchner, Lukas Nothdurfter, Wolfgang Neudorfer

The radware AppWall Web Application Firewall suffers from a source code disclosure vulnerability on the management interface. Gateway version 4.6.0.2 and AppWall version 1.0.2.6 are affected.

tags | advisory, web, info disclosure
SHA-256 | ebbeea0950171e622c7bc542b1f4ad855b5faa91b899e0552ab2e02824b79374

radware AppWall Source Disclosure

Change Mirror Download

Security Advisory
---------------------------------------
Vulnerable Software: radware AppWall Web Application Firewall
Vulnerable Version: Gateway Version 4.6.0.2 / AppWall Version
1.0.2.6
Homepage: http://www.radware.com/
Found by: Michael Kirchner, Wolfgang Neudorfer,
Lukas Nothdurfter (Team h4ck!nb3rg)
Impact: Source code disclosure on management interface


Product Description
---------------------------------------
Radware's AppWall is a Web application firewall (WAF) appliance that
secures Web applications. It enables PCI compliance by mitigating Web
application security threats and vulnerabilities to prevent data theft
and manipulation of sensitive corporate and customer information.
AppWall incorporates advanced, patent-protected Web application security
filtering technologies to seamlessly detect threats, block attacks and
report events.
[Source:
http://www.radware.com/Products/ApplicationDelivery/AppWall/default.aspx
]


Vulnerability Description
---------------------------------------
The radware AppWall Web Application Firewall operates as a reverse proxy
between the clients and the web server to be protected. All HTTP
requests are checked before being forwarded to the web server. The
system can be administered via a seperate management interface which is
normally not accessible for external users. The web interface is
realised using the PHP programming language. Some of the functionality
is stored in include files and embedded when needed. The files have a
*.inc extension and are not interpreted by the web server. A
user/attacker with access to the web management interface can therefore
access parts of the product source code by requesting the included files
directly.


Proof of Conept
---------------------------------------
The following example requests reveal product source code enabling an
attacker to search for further implementation vulnerabilities:
https://appwall/Management/funcs.inc
https://appwall/Management/defines.inc
https://appwall/Management/msg.inc


Vulnerable Versions
---------------------------------------
The tested version was Gateway Version 4.6.0.2 / AppWall Version
1.0.2.6. Prior versions are also likely to be vulnerable.


Patch
---------------------------------------
Currently we are not aware of any patch or update available.


Contact Timeline
---------------------------------------
2009-06-01: Vendor informed
2009-06-15: No response yet. Vendor contacted again.
2009-06-15: Initial vendor reply (Support ticket opened)
2009-07-01: No response yet as far as the vulnerability is concerned.
Public release


Further information
---------------------------------------
Information about the web application firewall project this advisory
originates from can be found at:
http://www.h4ck1nb3rg.at/wafs/

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close