Count.cgi hole

Summary
Description:You can read any .gif or .jpg on a server (readable by httpd daemon, of course) by giving a "image=../../../../path" type argument
Author:Razvan Dragomirescu <drazvan@kappa.ro>
Compromise:read protected .gif and .jpeg files (remote)
Vulnerable Systems:Those running version 2.3 of Muhammad A. Muquit's wwwcount
Date:10 October 1997
Details

From: Razvan Dragomirescu <drazvan@kappa.ro>
Subject:      Security flaw in Count.cgi (wwwcount)
To: BUGTRAQ@NETSPACE.ORG
Status: RO
X-Status: 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi all,

I have found a vulnerability in Muhammad A. Muquit's wwwcount version 2.3
which allows remote users to read any GIF file on the server, regardless
of HTTP permissions set. The file must be readable by the user running the
HTTP server and it can be anywhere on the disk (not only under the
HTTP daemon's document root directory)

It appears that the bug is present ONLY in version 2.3. Older versions do
not have it.

Here's how it works:

Using an URL like
http://attacked.host.com/cgi-bin/Count.cgi?display=image&image=../../../../../../path_to_gif/file.gif
you can see (and download) any GIF image on the server.

You can't use this to download other file types because the program
checks the file format.

The use for this is not yet very clear, but some companies might have
sensitive information in GIF files (charts, drafts etc.). And of course,
this is heaven for XXX site hunters who can bypass user-level
authentication and download the image if they know the name and the path.

And one more thing. A search on AltaVista for "Count.cgi" returned about
200.000 matches. I do not know how many of them were versions 2.3.... but
even 50.000 vulnerable computers do not make me feel comfortable.

Be good.
Razvan

P.S. You can find information about wwwcount at
http://www.fccc.edu/users/muquit/Count.html


- --
Razvan Dragomirescu
drazvan@kappa.ro  drazvan@romania.ro
drazvan@roedu.net drazvan@graypeak.com
Phone: +40-1-6866621
"Smile, tomorrow will be worse" (Murphy)


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQA/AwUBND5M8FnG/euRPmGVEQKbLwCeJb5/seO2tXUn8+2Evwy/jTyDmgcAn3BP
NqhNbPflg/tYJawK+itYODXm
=F5tQ
-----END PGP SIGNATURE-----

More Exploits!

The master index of all exploits is available here (Very large file)
Or you can pick your favorite operating system:
All OS's Linux Solaris/SunOS Micro$oft
*BSD Macintosh AIX IRIX
ULTRIX/Digital UNIX HP/UX SCO Remote exploits

This page is part of Fyodor's exploit world. For a free program to automate scanning your network for vulnerable hosts and services, check out my network mapping tool, nmap. Or try these Insecure.Org resources: