Bugtraq mailing list archives

[resend] Strumpf Noir Society on BadBlue


From: Strumpf Noir Society <vuln-dev () labs secureance com>
Date: Mon, 21 Jan 2002 15:07:15 +0100

Strumpf Noir Society Summaries
! Public release !
<--#


-= Strumpf Noir Society on BadBlue =-

(Sorry, couldn't resist.. Ok, so we might not be able to actually
drive a Mach truck, but this seems to do the trick, give or take
a few millions :)


Release date: Thursday, January 17, 2002


Introduction

BadBlue is the technology behind Working Resources Inc.'s product line with
the same name and which, amongst other things, also powers Deerfield.com's
D2Gfx file sharing community.

Working Resources Inc. :        http://www.badblue.com
Deerfield's D2Gfx :             http://d2gfx.deerfield.com


Summary

Below advisory will serve as a summary for our advisories sns2k2-badblue2
through sns2k-badblue6. These are all more or less related problems in 
mentioned software and we would not want to annoy too many people at 
once by sending out five advisories for one product, let's leave some
for next time eh?

(More details are available from our web site [1].)


Introduction

The BadBlue technology suffers from multiple vulnerabilities which
allow for a resource exhaustion attack to be executed against the server
and which could be abused to obtain read access to any file and to 
execute system commands on the target host.


When the going goes wrong, part 1:

BadBlue's main purposes are web serving and peer-to-peer file sharing.
Due to configuration issues between these functionalities, it is possible
to defeat the server's authentication schemes to execute commands on 
the system. Three different approaches have been found to easily circumvent
BadBlue's ip-based authentication. For these attacks to work, the attacker 
will need to have upload access to either a shared or virtual directory on
the target system, or has to trick the system owner into putting his files
in such a directory for him. 

Of all tested systems only BadBlue EE seems to include this upload 
functionality and as such is the only system directly vulnerable to these
attacks. We feel however that these vulnerabilities represent certain 
implementation issues in the whole of the product line. These will be looked
into by Working Resources Inc. in the next release of their product.

The attacks themselves consist of administrative command execution through
PHP or CGI-equivalent scripting, administrative command execution through
HTML tags and system command execution through MS Word macros.


Vulnerable:

- BadBlue Enterprise Edition (v1.5.?) for Win9x/NT/2000/ME/XP

Mentioned problems DO work on other versions of the software as well, however
it will require some social engineering to get the malicious files in an
accessible directory on the server.


When the going goes wrong, part 2:

BadBlue includes the ability to serve transcoded MS Office document data
over the web through a number of scripts/templates. More specifically,
the server is compatible with MS Word, MS Excel and MS Access. Due to two 
problems found to be shared in the accompanying scripts doc.htx, xls.htx 
and mdb.htx however, it is possible to remotely spawn multiple instances
of mentioned MS Office applications on the target system. This could be
abused in the form of a resource exhaustion attack. Also, there exists a
directory traversal attack in the parsers for these documents, which could
allow an attacker read access to any file on the target system. All systems
tested (BadBlue as well as D2Gfx) were vulnerable to these problems.


Vulnerable:

- BadBlue Personal Edition (v1.5.6 Beta) for Win95/NT4
- BadBlue Personal Edition (v1.5.6 Beta) for Win98/2000/ME/XP
- BadBlue Enterprise Edition (v1.5.?) for Win95/NT4
- BadBlue Enterprise Edition (v1.5.?) for Win98/2000/ME/XP
- Deerfield D2Gfx (v1.0.2 - Effectively BadBlue v1.0.2) for 
Win9x/NT/2000/ME/XP

All earlier versions which include mentioned .htx files are expected
to be fully or partially vulnerable to these problems.


Vendor status:

Vendor has been notified and has verified above issues. Currently a new
version of the BadBlue software is in the making, however no release date
for this was available at this time. Since some of the mentioned 
vulnerabilities leave a users system rather wide open, we've decided to 
post information on these issues and temporary workarounds. Users are
encouraged to upgrade as soon as the new BadBlue release comes 
available.


Workarounds/fixes:

1) Do not allow uploads to directories which can be accessed from the
server. This means virtual AS WELL AS shared directories.

2) If you have no use for the MS Office document sharing functions of
BadBlue, delete/rename/replace the following files: doc.htx, xls.htx and
mdb.htx.

3) If you do share MS Office documents through BadBlue, share them as
single files (meaning: do not select the "Share all files in this
folder (*.*)" option.

4) Limit the number of IP's to which your BadBlue server is accessible
to as few as possible through the "Restrict access by IP address" menu
under the "Advanced web server functions".

A possible fifth and final recommendation would be to disable IRC sharing.
This can be done in BadBlue's "Set your searching options" menu. Altough 
not a security issue perse, this feature is enabled by default in the BadBlue 
server installation (not in the D2Gfx version btw, which uses an older 
version of the BadBlue technology) and, besides some information disclosure, 
makes life quite a lot easier for anyone trying to find potential targets. 
Alternatives will be included in the next BadBlue release.


References:

Full advisories available from http://labs.secureance.com:

sns2k2-badblue2-adv:    "BadBlue Scripting Directory Traversal Vulnerability"
sns2k2-badblue3-adv:    "BadBlue Extensions Authentication Bypassing Vulnerability"
sns2k2-badblue4-adv:    "BadBlue Scripting Resource Exhaustion Vulnerability"
sns2k2-badblue5-adv:    "BadBlue HTML Tag Command Execution Vulnerability"
sns2k2-badblue6-adv:    "BadBlue Macro Execution Vulnerability"


yadayadayada

SNS Research is rfpolicy (http://www.wiretrip.net/rfp/policy.html) 
compliant, all information is provided on AS IS basis.

EOF, but Strumpf Noir Society will return!



Current thread: