SmarterStats 6.0 Multiple Vulnerabilities

Source: Internet
Author: User
Tags server hosting

 

Hoyt LLC Research | SmarterStats 6.0, OS Command Execution, Directory Traversal, DoS, Coordinated Disclosure

Author: Hoyt LLC Research | http://xss.cx | http://cloudscan.me

Vendor: SmarterTools

Application: SmarterStats 6.0

Bug (s): Directory Traversal, File Upload, OS Execution, XML Injection, SQL Injection, DoS

Patch: The Vendor has released SmarterStats Version 6.2 at URI aspx "> http://www.smartertools.com/smarterstats/web-analytics-seo-software-download.aspx

Timeline: Running y Vendor 10-12-2010 on SmarterStats Version 6.0

Full Disclosure Report available at URI http://xss.cx/examples/smarterstats-60-oscommandinjection-directorytraversal-xml-sqlinjection.html.html and http://www.cloudscan.me/2011/03/smarterstats-60-full-disclosure-xss-os.html

SmarterStats 6.0, Full Disclosure, OS Command Execution, Directory Traversal, DoS, Coordinated Disclosure

SmarterStats 6.0, Full Disclosure, OS Command Execution, Directory Traversal, DoS, Coordinated Disclosure

Author: Hoyt LLC Research | http://xss.cx | http://cloudscan.me

Vendor: SmarterTools

Application: SmarterStats 6.0

Bug (s): Directory Traversal, File Upload, OS Execution, XML Injection, SQL Injection, DoS

Patch: The Vendor has released SmarterStats Version 6.2 at URI http://www.smartertools.com/smarterstats/web-analytics-seo-software-download.aspx

Timeline: Running y Vendor 10-12-2010 on SmarterStats Version 6.0

Publication by Hoyt LLC Research on March 11,201 1 at URI http://www.cloudscan.me/2011/03/smarterstats-60-full-disclosure-xss-os.html

Hoyt LLC Research Blog URI Co., http://www.cloudscan.me/2011/03/smarterstats-60-full-disclosure-xss-os.html.

Full Disclosure Reports from Burp Suite Pro 1.3.09 http://xss.cx/examples/smarterstats-60-oscommandinjection-directorytraversal-xml-sqlinjection.html.html

Summary Statement:

CAPEC-88: OS Command Injection | Summary

An attacker can leverage OS command injection in an application to elevate privileges, execute arbitrary commands and compromise the underlying operating system.

CAPEC-213: Directory Traversal + CAPEC-48: Passing Local Filenames to funames That has CT a URL | Summary

This attack relies on client side code to access local files and resources instead of URLs. when the client browser is expecting a URL string, but instead has es a request for a local file, that execution is likely to occur in the browser process space with the browsers authority to local files. the attacker can send the results of this request to the local files out to a site that they control. this attack may be used to steal sensitive authentication data (either local or remote), or to gain system profile information to launch further attacks.

1. OS command injection next

There are 6 instances of this issue:

/Admin/frmSite. aspx [STTTState cookie]

/Admin/frmSite. aspx [ctl00% 24MPH % 24txtAdminNewPassword_SettingText parameter]

/Admin/frmSite. aspx [ctl00% 24MPH % 24 txtSmarterLogDirectory parameter]

/Admin/frmSite. aspx [ctl00% 24MPH % 24 ucsiteseosearchengineset%24chklistengines_settingcheckbox % 2414 parameter]

/Admin/frmSite. aspx [ctl00% 24MPH % 24 ucSiteSeoSettings % 24txtSeoMaxKeywords_SettingText parameter]

/Admin/frmSite. aspx [ctl00_MPH_grdLogLocations_HiddenLSR parameter]

Issue background

Operating system command injection vulnerabilities arise when an application incorporates user-controllable data into a command that is processed by a shell command interpreter. if the user data is not strictly validated, an attacker can use shell metacharacters to modify the command to be executed, and inject arbitrary further commands that will be executed by the server.

OS command injection vulnerabilities are usually very serous and may lead to compromise of the server hosting the application, or of the applications own data and functionality. the exact potential for exploitation may depend upon the security context in which the command is executed, and the privileges which this context has regarding sensitive resources on the server.

Issue remediation

If possible, applications shocould avoid inconfigurating user-controllable data into operating system commands. in almost every situation, there are safer alternative methods of parameter Ming server-level tasks, which cannot be manipulated to perform additional commands than the one intended.

If it is considered unavoidable to incorporate user-supplied data into operating system commands, the following two layers of defense shoshould be used to prevent attacks:

The user data shoshould be strictly validated. ideally, a whitelist of specific accepted values shoshould be used. otherwise, only short alphanumeric strings shoshould be accepted. input containing any other data, including any conceivable shell metacharacter or whitespace, shocould be rejected.

The application shoshould use command APIs that launch a specific process via its name and command-line parameters, rather than passing a command string to a shell interpreter that supports command chaining and redirection. for example, the Java API Runtime.exe c and the ASP. net api Process. start do not support shell metacharacters. this defense can mitigate the impact of an attack even in the event that an attacker circumvents the input validation defences.

 

 



Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.