The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Cisco Systems IOS 11 Web Service CDP Status Page Code Injection


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 19 Jan 2006 17:05:59 +0200
Subject: [NEWS] Cisco Systems IOS 11 Web Service CDP Status Page Code Injection
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060119213044.C99785851@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Cisco Systems IOS 11 Web Service CDP Status Page Code Injection
------------------------------------------------------------------------


SUMMARY

" 
<http://www.cisco.com/en/US/products/ps6537/products_ios_sub_category_home.html>; Cisco IOS Software is the world's leading network infrastructure software, delivering a seamless integration of technology innovation, business-critical services, and hardware platform support."

Improper validation of user provided input allow attackers to inject HTML 
and/or JavaScript code into the Cisco Systems IOS 11 Web Service.

DETAILS

Vulnerable Systems:
 * IOS version 11.2(8.11)SA6

Immune Systems:
 * IOS version 12

The vulnerability specifically exists due to insufficient filtering of 
user-supplied data which is displayed in the Cisco HTTP status pages.

One of the status pages included in the IOS 11 HTML package displays 
information about current CDP protocol statistics. The Cisco Discovery 
Protocol (CDP) is a proprietary, medium-independent protocol that runs 
over Layer 2 (the data link layer) on the Content Services Switches (CSS) 
and other Cisco manufactured equipment, such as routers, switches, 
bridges, and access servers.

Remote attackers can transmit carefully constructed CDP packets on the 
local segment to inject arbitrary scripting code into the CDP status 
pages. Once a legitimate user logs into the administrative website and 
views the CDP status page, arbitrary commands can be executed on the 
router via the injected scripting code.

Successful exploitation of this vulnerability allows unauthenticated 
remote attackers to execute arbitrary commands on the network device.

Once a legitimate user logs into the administrative web site and views the 
CDP status page, commands will execute with permissions of the logged in 
user. The the Cisco web administration interface allows users to access 
the same functionality available through the command line interface. A 
successful attack could manipulate routing information, add users, or 
execute any commands normally available to the logged in user.

A significant mitigating factor is that CDP is not a routed protocol and 
attacks are limited to the local segment, however the widespread practice 
of wardriving does increase the risk of attack for non-isolated segments. 
In addition, IOS 11 has been superseded by IOS 12 in new devices, however 
many older platforms cannot upgrade to IOS 12 due to flash ROM size 
constraints.

Remote exploitation of a input validation vulnerability in Cisco IOS 11 
HTML package can allow attackers to execute arbitrary scripting code.

Workaround:
If the network device is capable of running IOS 12, an upgrade is highly 
recommended.

If a workaround is required due to hardware restrictions, apply one of the 
following solutions to mitigate the vulnerability.

If CDP support is not required, disable CDP functionality from the IOS 
command line interface:
    cisco# configure terminal
    Enter configuration commands, one per line.  End with CNTL/Z.
    cisco(config)# no cdp run
    cisco(config)# end
    1w2d: %SYS-5-CONFIG_I: Configured from console by console
    cisco# write mem
    Building configuration...
    [OK]
    cisco# reload

If the web administration interface is not required, disable the http 
daemon via the IOS command line interface:
    cisco# configure terminal
    Enter configuration commands, one per line.  End with CNTL/Z.
    cisco(config)# no ip http server
    cisco(config)# end
    1w2d: %SYS-5-CONFIG_I: Configured from console by console
    cisco# write mem
    Building configuration...
    [OK]
    cisco# reload

If CDP support and the web interface are required, remove the CDP status 
page from the IOS flash:
    cisco#delete flash:html/cdp.html.gz
    Delete filename [html/cdp.html.gz]?y
    Delete flash:html/cdp.html.gz? [confirm]
    cisco#

It is also recommended to read the  
<http://www.cisco.com/en/US/products/hw/contnetw/ps792/products_configuration_guide_chapter09186a00801ee747.html>; Cisco configuration guide.

Disclosure Timeline:
03/24/2005  Initial vendor notification
01/17/2006  Initial vendor response
01/17/2006  Coordinated public disclosure


ADDITIONAL INFORMATION

The information has been provided by  
<mailto:idlabs-advisories@lists.idefense.com.> iDEFENSE Labs.
The original article can be found at:  
<http://www.idefense.com/intelligence/vulnerabilities/display.php?id=372>; 
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=372
The vendor advisory can be found at:  
<http://www.securiteam.com/securitynews/6G0072AEUW.html>; 
http://www.securiteam.com/securitynews/6G0072AEUW.html




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру