Vulnerability Development mailing list archives

Anti-Web "Vulnerability" is a false alarm


From: "D." <dugely () yahoo com>
Date: Sat, 1 Dec 2001 23:03:06 -0800 (PST)

Hello Bugtraq,

This is Doug Hoyte, head programmer of the Anti-Web
project. I'm responding to an "advisory" put out
recently by the "GOBBLES research group".

I was not contacted by this "researcher". I'm an
occassional reader of bugtraq, but I missed this
particular message. I wouldn't have found out at all
if I wasn't E-Mailed by Stuart Moore of
www.securitytracker.com (which is an
excellent security website, by the way.) Stuart also
said to me that he was unable to validate GOBBLES'
claims. Thank you for notifying me, Stuart.

Since early versions of Anti-Web, I've been aware of
GET request attacks using '..', '~', etc, and have
programmed this security into Anti-Web as such. As you
can imagine, I was very suprised by this "advisory". I
checked to make sure it was a recent version that
GOBBLES was testing. It was.

After reading GOBBLES' message through, I realized
that his testing procedure was completely flawed.

I'm not intimatley familiar with lynx, but I realized
that something strange was going on here.

I decided to disprove GOBBLES' technique. The ps and
netstat commands show that awhttpd is NOT running on
this system. Next, I run the same command procedure
that GOBBLES ran in his advisory.

/home/doug/tp2@orion$ uname -a
OpenBSD orion 2.9 DOUGS#0 i386
/home/doug/tp2@orion$ ps -aux | grep awhttpd
/home/doug/tp2@orion$ netstat -an | grep 2000
/home/doug/tp2@orion$ lynx -dump localhost:2000/../
GOBBLES
/home/doug/tp2@orion$ cat GOBBLES 

Current directory is /home/doug/tp2/

    -rw-r--r--    1 doug     doug           0 Dec  1
20:51 [1]GOBBLES
    -rw-r--r--    1 doug     doug       37287 Dec  1
20:34 [2]awhttpd-2.1.tgz
    drwxr-xr-x    3 doug     doug         512 Dec  1
20:35 [3]awhttpd/
    -rw-r--r--    1 doug     doug         928 Dec  1
20:50 [4]gobblesreply.txt

References

   1. file://localhost/home/doug/tp2/GOBBLES
   2. file://localhost/home/doug/tp2/awhttpd-2.1.tgz
   3. file://localhost/home/doug/tp2/awhttpd
   4. file://localhost/home/doug/tp2/gobblesreply.txt
/home/doug/tp2@orion$


Obviously, lynx isn't going through the webserver to
get this information.

Honestly, I don't see how GOBBLES could have thought
he discovered a security hole in here. Note in the
references it says "file://" instead of "http://";.
That should have been his first clue.

Although this proves nothing about AW's security (as
it proves nothing about any holes in AW), you can
quickly and easily verify the hole by trying GOBBLES'
"exploit" on an AW box (as GOBBLES himself didn't do,
obviously).

For instance, if AW is running in /var/webpage (as
mine is), try sending your favorite browser to
http://the.box.com/../../etc/passwd

You'll see a 404 Not Found.


After verifying this myself, I feel confident to
release this "vendor" response: (Damn I sound
professional :) )

The GOBBLES advisory is a false alarm. This
vulnerability doesn't exist in Anti-Web, and hasn't
existed since at least 2.0, and possibly earlier
versions. In other words, all publicly released
versions are safe.



Next, I'd like to clear my name a little bit. GOBBLES'
words were harsh, and as is now confirmed, completely
unfounded.

GOBBLES mentioned that it was a bit hypocritical of me
not to run AW on my own webserver. This seems to be
yet another prime example of GOBBLES' incompetence.

If he had investigated his claim even slightly, he
would have seen that the AW URL
(hardcoresoftware.cjb.net/awhttpd/) is a URL forwarder
to my own machine (pulsar.sytes.net) which is running
AW 2.2 on OpenBSD 2.9. Cjb.net isn't running AW, so I
can see how he could have gotten confused, but that
really is no excuse.

Proof? Cruise to pulsar.sytes.net in lynx and hit '='.

Why don't I just buy my own DNS name? I'm a poor
canadian college student with no credit card, so I
must rely on free DNS entries (no-ip.com) and URL
forwarders (cjb.net). Thank you to those services, by
the way.

As for my "mocking" of more popular webservers, I
realize that perhaps some of what I say in the README
could be taken the wrong way. All I'm saying is that
in more commonly used webservers, there tends to be a
lot of feature bloat which, as most bugtraq readers
should recognize, often results in security flaws.
Anti-Web is a smaller, more simple server than most of
the others out there. Don't get me wrong again, I have
an incredible amount of respect for the apache,
thttpd, and IIS programmers. They've got features in
their servers that I could only wish for, but
sometimes a more light-weight solution is in order.

Anyways, this shameless smear campaign that GOBBLES is
running is completely uncalled for and, I must say, a
seemingly common symptom on full disclosure lists. We
should all take a lesson from Stuart Moore, who
actually tested this "exploit" before putting it on
his website. The security community needs more
rational, intelligent minds like this, and less self
indulgent halfwits like GOBBLES trying vainly to make
names for themselves.

GOBBLES, please try to put yourself into the shoes of
an open source programmer. I love my code and I'm
proud of my code. As such, I have no problem sharing
the code under the GPL. I'm genuinely happy when
people use it and stress test it for vulnerabilities.
All I ask is that you at least notify me before you
ruin my reputation, and for god's sake, confirm your
fucking exploits! 



Doug Hoyte

P.S. Anti-Web is up for download at
http://hardcoresoftware.cjb.net/awhttpd/
Or, you could just search Freshmeat.


Thanks go to Stuart Moore, the OpenBSD team,
#disguise, #hackcanada

__________________________________________________
Do You Yahoo!?
Buy the perfect holiday gifts at Yahoo! Shopping.
http://shopping.yahoo.com


Current thread: