[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
ContentKeeper - Remote command execution and privilege escalation
aushack.com - Vulnerability Advisory
ContentKeeper Technologies - ContentKeeper Web
"ContentKeeper is an industry leading Internet content filter that allows
organisations to monitor, manage, control & secure staff access to
ContentKeeper 125.09 and below.
Remote command execution and privilege escalation vulnerabilities.
High - Unauthenticated users with access to the management IP address
of the device may execute commands remotely as the apache user.
Furthermore, a privilege escalation vulnerability is present allowing
for unauthenticated remote root compromise.
The appliance is administered by use of a web browser HTML based front
end. The .htaccess file prohibits unauthenticated access to known
pages, however other binaries, such as mimencode, are exposed.
By sending a HTTP POST request, it is possible to write arbitrary data
to a default file which has world read-write-execute permissions.
It is then possible to send a HTTP GET request to the written file, to execute
arbitrary commands remotely. It is also possible to use mimencode to conduct
directory traversal style attacks, e.g. obtaining a mime encoded copy of
In addition, the setuid root benetool available to the apache user contains an
unsafe call to 'ps' and others, allowing for PATH manipulation for
A Metasploit Framework Module is available in the trunk.
Upgrade to 125.10 or above.
Patrick Webster (patrick@xxxxxxxxxxx)
10-Apr-2008 - Discovered during audit.
18-Jul-2008 - Vendor notified.
18-Jul-2008 - Vendor response.
25-Feb-2009 - Vendor confirmed patched version.
03-Apr-2009 - Public disclosure.