Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:21579
HistoryApr 03, 2009 - 12:00 a.m.

ContentKeeper - Remote command execution and privilege escalation

2009-04-0300:00:00
vulners.com
50

aushack.com - Vulnerability Advisory

Release Date:
03-Apr-2009

Software:
ContentKeeper Technologies - ContentKeeper Web
http://www.contentkeeper.com/

"ContentKeeper is an industry leading Internet content filter that allows
organisations to monitor, manage, control & secure staff access to
Internet resources."

Versions affected:
ContentKeeper 125.09 and below.

Vulnerability discovered:

Remote command execution and privilege escalation vulnerabilities.

Vulnerability impact:

High - Unauthenticated users with access to the management IP address
of the device may execute commands remotely as the apache user.
Furthermore, a privilege escalation vulnerability is present allowing
for unauthenticated remote root compromise.

Vulnerability information

The appliance is administered by use of a web browser HTML based front
end. The .htaccess file prohibits unauthenticated access to known
HTML management
pages, however other binaries, such as mimencode, are exposed.

By sending a HTTP POST request, it is possible to write arbitrary data
to a default file which has world read-write-execute permissions.

It is then possible to send a HTTP GET request to the written file, to execute
arbitrary commands remotely. It is also possible to use mimencode to conduct
directory traversal style attacks, e.g. obtaining a mime encoded copy of
'/etc/passwd'.

In addition, the setuid root benetool available to the apache user contains an
unsafe call to 'ps' and others, allowing for PATH manipulation for
root escalation

A Metasploit Framework Module is available in the trunk.

Solution:
Upgrade to 125.10 or above.

References:
aushack.com advisory
http://www.aushack.com/200904-contentkeeper.txt

Credit:
Patrick Webster ([email protected])

Disclosure timeline:
10-Apr-2008 - Discovered during audit.
18-Jul-2008 - Vendor notified.
18-Jul-2008 - Vendor response.
25-Feb-2009 - Vendor confirmed patched version.
03-Apr-2009 - Public disclosure.

EOF