Full Disclosure mailing list archives

RE: Frontpage Extensions Remote Command Execution


From: "Marc Maiffret" <mmaiffret () eeye com>
Date: Thu, 13 Nov 2003 18:09:58 -0800

| From: mattmurphy () kc rr com
| Sent: Wednesday, November 12, 2003 10:47 AM
| To: full-disclosure () lists netsys com
<snip>
| Well, for one, it's not root level.  It allows ANONYMOUS 
| (Guest) access to
| a site using FPSE for anyone who can POST to a vulnerable 
| ISAPI extension. 
| FPSE is not enabled by default on any OS other than Windows 
| 2000 Server
| series OSes (according to MS), and is usually a security risk anyway. 

Indeed this flaw does not directly result in "root", SYSTEM, or administrator level code execution. However, it does 
result in executing code in the context of a shared process/privilege (dllhost) that is used for other critical web 
components. Its always interesting to me when people down play the severity of a vulnerability by saying "Its only 
remote code execution as an unprivileged user." That stupid statement should leave any knowledgeable person laughing. 
But since some people seem confused about this type of flaws severity...

What is an unprivileged user? It seems to me that if your attacking a service, and can now execute code as you wish 
within that service, then you are actually VERY privileged. As in the case of CodeRed and the .ida overflow you could 
perform in-line API hooking within the affected application. For example since a lot of eCommerce related scripts and 
ISAPI's are running in dllhost (same privilege/execution as this FrontPage overflow) you can now, with this 
"unprivileged" attack, intercept critical data and launch further attacks. For example hooking the dllhost outbound 
data sends, in an effort to attack visitors to the now owned website. Maybe using something like the recent "zero day" 
(well not anymore) [1]IE Object Bug. Or steal form inputs, and god knows what else. In the end an attacker is still 
becoming "privileged" to do things that they should not be. While maybe they cant interact with other data/processes on 
the system, they still can do anything they want to the pr!
 ocess they are executing code within, and also any data that process has access to. 

Now you might not agree with the above statements and be ignorant to still think "its just 'unprivileged' code 
execution, who cares" So then lets move on to the real-world examples of where you combine two attacks. One attack 
being remote code execution as an "unprivileged" user and the second being a local privilege escalation vulnerability.

Take your pick there is a constant stream of local privilege escalation vulnerabilities. I'll actually use a really old 
example, just to illustrate this style of combined attack is not new.

Three years ago, almost to this date, eEye released an [2]advisory on how to gain remote SYSTEM on a Microsoft IIS web 
server. The vulnerability we discovered was not actually a remote SYSTEM level vulnerability. In fact it was a "local" 
vulnerability within .ASP file parsing, that would lead to a buffer overflow and code execution as SYSTEM. Combine this 
"local" SYSTEM privilege elevation with any unprivileged IIS attack (At the time we used Unicode), and b00m, now you 
have remote SYSTEM. So for example, if this local buffer overflow still existed, you could combine Brett Moores 
FrontPage attack with this local overflow and now you easily have remote SYSTEM, whereas if you didn't have Brett's 
flaw, you wouldn't have remote SYSTEM. Anyways again this is a 3 year old example illustrating why these "unprivileged" 
remote code execution bugs are in fact still VERY relevant and important. Hopefully no one responds saying "yah but 
that was 3 years ago"... go do some homework, ther!
 e are plenty of very recent privilege escalation flaws that have been released. In fact Brett Moore himself has 
released some recently. So I wouldn't put it past him to have an exploit that combines one of those priv flaws with his 
FrontPage flaw to allow remote SYSTEM shells on vulnerable systems. vegas again soon? :-)

As for your comment about Windows 2000... I am not sure what that was about other than to further illustrate how 
critical this flaw is since your basically saying this flaw affects default installations of the operating system most 
prevalent and depended on by the majority of the business world.

[1] eEye IE Object Bug Advisory - http://www.eeye.com/html/Research/Advisories/AD20030820.html
[2] eEye $19.95 "dual-bug" privilege hack http://www.eeye.com/html/Research/Advisories/AD20001003.html

<snip>
| You know, I can't believe that people criticize MS for sitting on the
| details of root-level holes when they don't even bother to read the
| bulletin.  A decent admin would configure FPSE such that this 
| flaw is a
| non-issue.  This is because no ordinary user has a reason to 
| be accessing
| FPSE's files.  If FPSE is secured, this means that an 
| attacker is getting
| their own privileges back.

Its not worth really discussing your comment about how this is a mute issue if administrators would configure their 
software correctly. Obviously we cannot depend on administrators to know, or have the time (that's more often the 
case), to correctly configure their systems. If that were true then we wouldn't have had CodeRed and and all the other 
worms, because proper security policy would have stopped them (Ala, hardening the .ida ISAPI, and hardening RPC etc..). 
In the end basing the criticality of a vulnerability on what administrators should or shouldn't have done, blame 
shifting away from vendors, is a rather wasted endeavor because the technical facts simply speak for themselves.

This flaw shouldn't have been left to be fixed for almost a year. Microsoft should not have knowingly left customers 
vulnerable for almost a year. Microsoft fucked up.

Signed,
Marc Maiffret
Chief Hacking Officer
eEye Digital Security
T.949.349.9062
F.949.349.9538
http://eEye.com/Retina - Network Security Scanner
http://eEye.com/Iris - Network Traffic Analyzer
http://eEye.com/SecureIIS - Stop known and unknown IIS vulnerabilities 
"You think they're selling you truth, but truth is they're selling you out, and if we keep buying in, the line between 
lies and truth, will wear paper thin."

Important Notice: This email is confidential, may be legally privileged, and is for the intended recipient only. 
Access, disclosure, copying, distribution, or reliance on any of it by anyone else is prohibited and may be a criminal 
offense.  Please delete if obtained in error and email confirmation to the sender.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: