User:Dgeerts/DontLookAtMe

From Atlas Wiki
Jump to navigation Jump to search

Able to run arbitrary executables on Windows Terminal server

  • Type: Local arbitrary code execution
  • Status: Not fixed

Microsoft Windows' bootloader by default checks the header of the executable it is given, to determine whether it is an EXE, BAT or COM file, and automatically runs it as the proper type. The current configuration on the Nikhef Windows Terminal Server blocks the loading of arbitrary EXE and COM files, but not arbitrary BAT files. Thus, by renaming the file extension from EXE to BAT, this security feature is circumvented, and the executable executed.

PHP scripts on webserver run under 'web' account

  • Type: Local privilege escalation
  • Status: Fixed

Any PHP script run on the webserver (by, for example, dropping the scriptfile into the user's public_html directory) executes under the 'web' account. This allows users to escalate their privilege (if the 'web' account has more rights than the user's account).

PHP on webserver able to reach main filesystem

  • Type:
  • Status: Not fixed

The PHP installation running on the webserver is able to reach the main filesystem (at least the *nix side) without any problems. In fact, several directories are exposed to the web (by design). This allows PHP scripts to access the filesystem, and (if rights permit) even write to the filesystem.

PHP on webserver able to exec arbitrary executables

  • Type:
  • Status: Not fixed

Using PHP's built-in 'exec' command, a PHP script can run arbitrary executables on the webserver.

World-writable folder(s) on webserver

  • Type:
  • Status: Partially fixed

There are several world-writable files and folders that are served by the webserver, allowing a local user to put content on the website. Main example: /public/www/pub. Was used to deface the Nikhef Travel Booking system (this one is fixed). Various others remain. (Mostly 'registration participant' files.)

Password file of Nikhef travel system externally reachable

  • Type:
  • Status: Not fixed

The password file of the Nikhef Travel Booking system is externally reachable by URL: http://www.nikhef.nl/pub/travel/config.inc. The Urenregistratie system has a similar file (geheim.php), but this is both protected by being having a PHP extension, and, more importantly, not being accessible by other accounts. However, it is readable by the webserver (obviously), so a simple dump-content-of-file PHP script is able to display the contents of this file anyway.

Nikhef travel system has full PHP error reporting enabled

  • Type: Information disclosure
  • Status: Fixed

All the PHP error reporting functions are enabled in the Nikhef Travel Booking system. Whenever any exception occured, full error information (what error, file (with fill path) and linenumber) are displayed to the external user.

Nikhef travel system leaks logged-in status of users

  • Type: Information disclosure
  • Status: Not fixed

Using, for example, the URL: http://www.nikhef.nl/pub/travel/reizen.php?cmd=1&als=0&gebruiker=XXX, where 'XXX' is a user ID, the Travel system will respond differently whether a user is logged in (= has a session defined in the database) or not. Logged in users will produce a "Session corrupt" page, while not logged in users will actually produce a PHP error message.