Difference between revisions of "User:Dgeerts/DontLookAtMe"

From Atlas Wiki
Jump to navigation Jump to search
 
(5 intermediate revisions by the same user not shown)
Line 1: Line 1:
=Able to run arbitrary executables on Windows Terminal server=
 
*<B>Type</B>: Local arbitrary code execution
 
*<B>Status</B>: <FONT color=red>Not fixed</FONT>
 
  
Microsoft Windows' bootloader by default checks the header of the executable it is given, to determine whether it is an EXE, BAT or COM file, and automatically runs it as the proper type. The current configuration on the Nikhef Windows Terminal Server blocks the loading of arbitrary EXE and COM files, but not arbitrary BAT files. Thus, by renaming the file extension from EXE to BAT, this security feature is circumvented, and the executable executed.
 
 
=PHP scripts on webserver run under 'web' account=
 
*<B>Type</B>: Local privilege escalation
 
*<B>Status</B>: <FONT color=blue>Fixed</FONT>
 
 
Any PHP script run on the webserver (by, for example, dropping the scriptfile into the user's public_html directory) executes under the 'web' account. This allows users to escalate their privilege (if the 'web' account has more rights than the user's account).
 
 
=PHP on webserver able to reach main filesystem=
 
*<B>Type</B>:
 
*<B>Status</B>: <FONT color=red>Not fixed</FONT>
 
 
The PHP installation running on the webserver is able to reach the main filesystem (at least the *nix side) without any problems. In fact, several directories are exposed to the web (by design). This allows PHP scripts to access the filesystem, and (if rights permit) even write to the filesystem.
 
 
=PHP on webserver able to exec arbitrary executables=
 
*<B>Type</B>:
 
*<B>Status</B>: <FONT color=red>Not fixed</FONT>
 
 
Using PHP's built-in 'exec' command, a PHP script can run arbitrary executables on the webserver.
 
 
=World-writable folder(s) on webserver=
 
*<B>Type</B>:
 
*<B>Status</B>: <FONT color=yellow>Partially fixed</FONT>
 
 
There are several world-writable files and folders that are served by the webserver, allowing a local user to put content on the website. Main example: /public/www/pub. Was used to deface the Nikhef Travel Booking system (this one is fixed). Various others remain. (Mostly 'registration participant' files.)
 
 
=Password file of Nikhef travel system externally reachable=
 
*<B>Type</B>:
 
*<B>Status</B>: <FONT color=red>Not fixed</FONT>
 
 
The password file of the Nikhef Travel Booking system is externally reachable by URL: [http://www.nikhef.nl/pub/travel/config.inc http://www.nikhef.nl/pub/travel/config.inc]. The Urenregistratie system has a similar file (geheim.php), but this is both protected by being having a PHP extension, and, more importantly, not being accessible by other accounts. However, it is readable by the webserver (obviously), so a simple dump-content-of-file PHP script is able to display the contents of this file anyway.
 

Latest revision as of 15:38, 4 July 2011