[12507] in bugtraq

home help back first fref pref prev next nref lref last post

Re: BigIP - bigconf.cgi holes

daemon@ATHENA.MIT.EDU (Guy Cohen)
Wed Nov 10 12:30:31 1999

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <19991110113009.A13654@crypto.org.il>
Date:         Wed, 10 Nov 1999 11:30:09 +0200
Reply-To: Guy Cohen <guy@CRYPTO.ORG.IL>
From: Guy Cohen <guy@CRYPTO.ORG.IL>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <111627409F79D2119FB100A0C9EEDC3ED735F4@f5-exchange.win.net>;
              from Rob Gilde on Tue, Nov 09, 1999 at 11:30:55AM -0800

Hello again,

First of all i mast apologiz for the corrupt date of my last post.
now:

Rob Gilde wrote:
.|
.| Guy is discussing an issue that affects older versions of BIG/ip.
.| As he points out, the risk is from internal users.  In older versions
.| of BIG/ip, there is effectively only one user and that user has root
.| privileges.  That user could execute commands as root through a shell
.| escape in our web-based user interface.
.|
.| As of Version 2.1, this is no longer possible.  The current version
.| of BIG/ip is 2.1.2.  The software update is available for free over
.| the net to all customers with support contracts.
.|

unfortunately This effects version 2.1.2 too.
I have added (using the html interface) user with READ-ONLY access, logged
in as this user and by executing
'bigconf.cgi?command=view_textfile&file=/etc/master.passwd&filters=;' I was
able to see the the encrypted passwords in /etc/master.passwd witch is for
root eyes only.


--
Guy Cohen.

home help back first fref pref prev next nref lref last post