what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

xitami-2.5b4.txt

xitami-2.5b4.txt
Posted Nov 22, 2001
Authored by Zerologic | Site nssolution.net

Xitami WEB/FTP Server for Windows 95/98/NT/2k v2.5b4 has remote vulnerabilities which allow users to view sensitive system information via testcgi.exe. Passwords are stored in plain text. Denial of service is possible.

tags | exploit, remote, web, denial of service, vulnerability
systems | windows
SHA-256 | 963cbf8d5f403c450c746e48d4a87ee002babfa21848572bbe2f6ac1680a715f

xitami-2.5b4.txt

Change Mirror Download
Network Security Solutions Inc. Security AdvisorY
(Philippine based Security Company)

Http://www.Nssolution.net
Http://connect.to/nssi

]*** Xitami WEB/FTP release 2.5b4 Server Multiple Security Vulnerabilities ***[

Author: Abraham Lincoln
handle: zer0logic

Email : Abraham@nssolution.net, zer0logic@PrivacyX.Com,
Abraham@Digital-Defense-Network.Net

Date Discovered: November 29, 2000
Vendor: iMatix Corporation

Disclaimer:
This paper is intended for informational purpose only. The Author is not
responsible for the the Use and/or potential effects of these advisories.
Read this at your own risk! or not at all.


1] 1st Vulnerability - TestCgi.exe file vulnerability

Version Affected: Xitami Web Server release 2.5b4
for Win 95 / 98 / NT / Win2k
Local : Yes
Remote: Yes
Risk: Medium

Problem Description:

- Xitami Webservers default installation /Cgi-Bin directory has a Vulnerability that allows remote users to View
information regarding your system and Webserver's Directory by executing TestCgi.exe using your browser sample:
Http://www.Target.com/cgi-bin/testcgi

Sample output:

Environment Variables

COMPUTERNAME = MYSERVER
COMSPEC = C:\WINNT\system32\cmd.exe
HOMEDRIVE = C:
HOMEPATH = \
LOGONSERVER = \\MYSERVER
NUMBER_OF_PROCESSORS = 1
OS = Windows_NT
OS2LIBPATH = C:\WINNT\system32\os2\dll;
PATH = C:\WINNT\system32;C:\WINNT
PROCESSOR_ARCHITECTURE = x86
PROCESSOR_IDENTIFIER = x86 Family 6 Model 8 Stepping 3, GenuineIntel
PROCESSOR_LEVEL = 6
PROCESSOR_REVISION = 0803
SYSTEMDRIVE = C:
SYSTEMROOT = C:\WINNT
TEMP = C:\TEMP
TMP = C:\TEMP
USERDOMAIN = MYSERVER
USERNAME = Administrator
USERPROFILE = C:\WINNT\Profiles\Administrator
WINDIR = C:\WINNT
HTTP_ACCEPT_CHARSET = iso-8859-1,*,utf-8
HTTP_ACCEPT_LANGUAGE = en
HTTP_ACCEPT_ENCODING = gzip
HTTP_ACCEPT = image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
HTTP_HOST = 127.0.0.1
HTTP_USER_AGENT = Mozilla/4.75 [en] (WinNT; U)
HTTP_CONNECTION = Keep-Alive
HTTP_CONTENT_LENGTH = 0
SERVER_SOFTWARE = Xitami
SERVER_VERSION = 2.5b4
SERVER_NAME = 127.0.0.1
SERVER_URL = https://127.0.0.1/
SERVER_PORT = 0
SERVER_PROTOCOL = HTTP/1.1
SERVER_SECURITY = -
GATEWAY_INTERFACE = CGI/1.1
REQUEST_METHOD = GET
QUERY_METHOD = GET
SCRIPT_PATH = cgi-bin
SCRIPT_NAME = /cgi-bin/testcgi
CONTENT_TYPE =
CONTENT_LENGTH = 0
REMOTE_USER = -
REMOTE_HOST = 127.0.0.1
REMOTE_ADDR = 127.0.0.1
PATH_INFO =
PATH_TRANSLATED = C:/Xitami/webpages
DOCUMENT_ROOT = C:/Xitami/webpages
CGI_ROOT = C:/Xitami/cgi-bin
CGI_URL = /cgi-bin
CGI_STDIN = C:\TEMP\pipe0001.cgi
CGI_STDOUT = C:\TEMP\pipe0001.cgo
CGI_STDERR = cgierr.log

The Problem lies in the Default Installation of Xitami Webserver in /cgi-bin directory where testcgi.exe is located.
this problem could allow a malicious user to gain information about your system that can be used to Penetrate the whole
system.

Work Around:
Delete testcgi.exe file, or disable cgi-bin directory in Xitami Administration under cgi properties and always don't use
any default installation always re configure your webserver after installing. Read some articles regarding WWW Security FAQ
and CGI Vulnerabilities @ https://www.w3.org/Security/Faq/


2] 2nd Vulnerability - Plain text Password vulnerability

Version Affected: Xitami Web Server release 2.5b4
for Win 95 / 98 / NT / Win2k
Local : Yes
Remote: No
Risk: Medium

Problem Description:
- I Discovered that Xitami WEbserver is storing Plain Text Password of Xitami Webserver Administration to
defaults.aut file in default installation folder of Xitami webserver w/c is C:\Xitami. even if you gonna change the installation folder
its still the the same.
Example:
defaults.aut
# Created at installation time
#
[/Admin]
admin="root123" <----- admin=username password=root123
[Private]
Jacky=robusta

The Problem lies when the attacker gains a physical access to Xitami root directory and opens the file Defaults.Aut
the attacker may use this to gain administrator access to webserver Administration example: https://localhost/admin then the
attacker enters the username and the password that stores in defaults.aut then the attacker already gains a full access to the
web server administration site.

And if you try to put the password file to other folder next time you logon to Xitami WEb Administration site this error
will appear --> Abort at smthttp:Resolve-Virtual-Hostname: (Have-Client-Request, Finished-Event) And Causes the
Webserver to Un-usable and you need to re install the whole Application.

Work around:
Don't leave your Workstation or Server open to Physical Access to the root directory of Xitami web server always
change the default folder for the webserver instead of using C:\Xitami.

3] 3rd Vulnerability - Xitami Webserver and FTP Server for Win95/Win98 is Affected by /CON/CON exploit

Version Affected: Xitami Web Server release 2.5b4
for Win 95 / 98
Local : Yes
Remote: Yes
Risk: High

Problem Description:

- Xitami Webserver and FTP Server is still Vulnerable w/ /Con/Con bug of Windows 95 and 98 that causes the
Webserver and FTP Server to Shutdown/Crash and sometimes even the whole Operating System gets a Fatal Error. the
Application needs to re-start again to perform normal operation.

The Problem lies when the attacker send this request to the Webserver -->GET /con/con HTTP/1.0 by using
telnet client to execute this to remote host type -->Telnet <Target IP> 80 if you are already connected try to Execute the GET
/con/con HTTP/1.0 command then press Enter. The Server will Now crash or Shutdown and If the Operating System is Not Patch with Con/Con Bug.

On the FTP Server try to login as a Anonymous user or any user that allows access to FTP Server then execute
this Command Ftp>cd /con/con the FTP Server will disconnect you from remote host and it will Shutdown or Crash.

Work Around:
Install the Con/Con Bug PATCH to your Operating System, Patch is Available @ Microsoft Website or @ https://packetstormsecurity.org/Win/ConConFix2.zip coz` the bug also lies on ur O.S.

Vendor Status: iMatix Corporation has been notified of this Vulnerability but no patch has been issued yet.

NOTE:
Sorry for the grammar etc... coz` this is just a 5 Minute Exploit if u have some questions email me.. all spam mails and lame emails are just ignored. -zer0logic-

Related Links: Http://www.nssolution.net
Http://connect.to/nssi
Http://www.Digital-Defense-Network.Net


Feedback and Inquiries:
If you have any questions, inquiries, feedback, concerns and
updates pls don't hesitate to email us.

For Inquiries,Concerns and updates - Info@Nssolution.net

for Comments and Questions - Abraham@nssolution.net ,lincoln@privacyx.com
zer0logic@privacyx.com
IRC - Dal.net #DDN Undernet #Hackphreak

Copyright(c) 2000-2001 Network Security Solutions Inc.
Permission is herby granted for the redistribution of this alert
electronically. if you wish to reprint or modify this document Contact us
1st or email us at: info@Nssolution.Net
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close