Bugtraq mailing list archives

iXsecurity.20020316.csadmin_dir.a


From: "Patrik Karlsson" <Patrik.Karlsson () ixsecurity com>
Date: Wed, 3 Apr 2002 17:58:47 +0200

iXsecurity Security Vulnerability Report
No: iXsecurity.20020316.csadmin_dir.a
========================================

Vulnerability Summary
---------------------
Problem:                Cisco Secure ACS webserver has a directory
traversal
                        issue.

Threat:                 An attacker could retrieve any html, htm, class,
                        jpg, jpeg or gif file outside of the webroot.

Affected Software:      Cisco Secure ACS 2.6.X and 3.0.1 (build 40).

Platform:               Windows NT/2000.

Solution:               Install the patch from Cisco.

Vulnerability Description
-------------------------
Cisco Secure ACS has a webserver interface listening on port 2002.
It is possible for a logged in user to read files outside the webdirectory.
After a succesfull login, one could supply eg.
http://<ip>:<dynamicport>/..\..\..\..\..\..\temp\temp.class to read the
contents
of the file temp.class in the folder temp on the same volume that the
software
is installed.

Solution
--------
Cisco PSIRT can confirm this vulnerability. The Security Advisory
was published and it is at
http://www.cisco.com/warp/public/707/ACS-Win-Web.shtml
Only Cisco ACS for Windows is affected. The Unix version is not
affected by these issues. You can download patches by following
instructions in the Advisory.

Additional Information
----------------------
Cisco was contacted 20020316.


This vulnerability was found and researched by
Jonas Ländin, jonas.landin () ixsecurity com
Patrik Karlsson, patrik.karlsson () ixsecurity com


Current thread: