The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Cisco Collaboration Server Vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 4 Jul 2004 18:59:18 +0200
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Subject: [NT] Cisco Collaboration Server Vulnerability

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Cisco Collaboration Server Vulnerability
------------------------------------------------------------------------


SUMMARY

Cisco Collaboration Server (CCS) versions earlier than 5.0 ship with 
ServletExec versions that are vulnerable to attack where unauthorized 
users can upload any file and gain administrative privileges. The 
workaround is documented in the Workaround section below. Cisco has 
provided an automated script to remove this vulnerability from the CCS 4.x 
versions

DETAILS

Vulnerable products:
CCS using an unpatched ServletExec version earlier than 3.0E is 
vulnerable.
 * CCS 4.x ships with ServletExec 3.0 which is vulnerable until patched. 
CCS 4.0 customers can patch the software with an automated script or 
upgrade to CCS 5.x
 * CCS 3.x ships with ServletExec 2.2 which is vulnerable until patched. 
An automated script is not available for CCS 3.0. Customers can patch the 
software by following the manual instructions in the Workaround section, 
upgrade to CCS 4.x and patch the software with an automated script, or 
upgrade to CCS 5.x.

Products confirmed not vulnerable:
 * CCS 5.x ships with ServletExec 4.1 and is not vulnerable

Details:
Cisco Collaboration Server utilizes the ServletExec subcomponent provided 
by New Atlanta for Microsoft Windows 2000 and Windows NT. ServletExec 
versions prior to SE 3.0E allow for an attacker to upload files to the Web 
server and invoke them. Cisco bug id CSCed49648. Users should upgrade to 
CCS 5.x that ships with ServletExec 4.1, download the automated script for 
CCS 4.x, or follow the manual instructions in the Workaround section.

Patching ServletExec either with the automated script or manual 
instructions removes the UploadServlet from the ServletExec30.jar file but 
does not alter the version number. The best way to test if the CCS is 
vulnerable is to attempt to load the 
http://<ccsservername>/servlet/UploadServlet URL when CCS is up and 
running. If this attempt results in a NullPointerException, the 
vulnerability is present. If this results in a Page Not Found error, then 
the CCS is not vulnerable.

Customers can continue to obtain and apply the most current patches for 
ServletExec by following the instructions on the New Atlanta website:  
<http://www.newatlanta.com/biz/c/products/servletexec/self_help/faq/detail?faqId=195>; http://www.newatlanta.com/biz/c/products/servletexec/self_help/faq/detail?faqId=195 . Additionally, customers are encouraged to go to the following Cisco web pages for tips on increasing security on their CCS:  <http://www.cisco.com/application/pdf/en/us/guest/products/ps1001/c1067/ccmigration_09186a008020f9b4.pdf>; http://www.cisco.com/application/pdf/en/us/guest/products/ps1001/c1067/ccmigration_09186a008020f9b4.pdf Refe
r to page 38 for ServletExec notes and refer to page 71 for notes on Collaboration Option.

Cisco Collaboration Server (CCS) has been sold as a standalone product or 
as part of Cisco Web Collaboration Option where it is integrated with the 
Cisco Intelligent Contact Management (ICM) software. A user can determine 
their version level by using the http://<;ccs server>/version command, 
where <ccs server> is the hostname or IP address.

Impact:
Cisco Collaboration Server (CCS) versions earlier than 5.0 ship with 
ServletExec versions that are vulnerable to attack where unauthorized 
users can upload any file and gain administrative privileges.

 *  
<http://www.cisco.com/pcgi-bin/Support/Bugtool/onebug.pl?bugid=CSCed49648 
> CSCed49648 


Software Versions and Fixes:
Cisco Collaboration Server 4.x users can patch the software with an 
automated script available at  
<http://www.cisco.com/pcgi-bin/tablebuild.pl/ccs40>; 
http://www.cisco.com/pcgi-bin/tablebuild.pl/ccs40, or patch the software 
by following the manual instructions in the Workaround section, or upgrade 
to CCS 5.x.

Cisco Collaboration Server 3.x users can patch the software by following 
the manual instructions in the Workaround section, or upgrade to CCS 4.x 
and patch the software with an automated script, or upgrade to CCS 5.x.

Workarounds:
Manual Instructions to Patch CCS 3.x
Complete these steps to patch CCS 3.x:

 1. Stop Internet Information Server (IIS).
 2. Run Winzip or your favorite zip utility and open ServletExec22.jar in 
the C:\Program Files\new atlanta\servletexec ISAPI\lib directory.
 3. Delete UploadServlet.class.
 4. Save ServletExec22.jar back to its original location and exit Winzip.
 5. Restart IIS.

Manual Instructions to Patch CCS 4.x
Complete these steps to patch CCS 4.x:

 1. Stop Internet Information Server (IIS).
 2. Run Winzip or your favorite zip utility and open ServletExec30.jar in 
the C:\Program Files\new atlanta\servletexec ISAPI\lib directory.
 3. Delete UploadServlet.class.
 4. Save ServletExec30.jar back to its original location and exit Winzip.
 5. Restart IIS.

CCS 5.x is not vulnerable and these manual instructions do not apply.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:psirt@cisco.com.> Cisco 
Systems Product Security Incident Response Team.
The original article can be found at:  
<http://www.cisco.com/warp/public/707/cisco-sa-20040630-CCS.shtml>; 
http://www.cisco.com/warp/public/707/cisco-sa-20040630-CCS.shtml




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру