Originally Published: Tuesday, 18 January 2000 Author: Derrick H. Lewis
Published to: news_enhance_security/Security News Page: 1/1 - [Printable]

Nortel Contivity Vulnerability.

[Bugtraq] Nortel's new Contivity series of extranet switches give administrators the ability to enable a small HTTP server and use Nortel's web based administration utility to handle configuration and maitenance. But an intruder can view any file on the switch without logging in.

   Page 1 of 1  

Description -----------

Nortel's new Contivity series of extranet switches (http://www.nortelnetworks.com/products/01/contivity) give administrators the ability to enable a small HTTP server and use Nortel's web based administration utility to handle configuration and maitenance. The server runs atop the VxWorks operating system and is located in the directory /system/manage. A CGI application, /system/manage/cgi/cgiproc that is used to display the administration html pages does not properly authenticate users prior to processing requests. An intruder can view any file on the switch without logging in.

Method of exploitation:

Pretty much a no brainer: http://x.x.x.x/manage/cgi/cgiproc?Nocfile=/name/and/path/of/file.

(interesting places to look: /system/filelist.dat, /system/version.dat, /system/keys, /system/core, etc.)

The only entry found in the event/security logs after exploitation is this:

09:44:23 tEvtLgMgr 0 : Security [12] Management: Request for cgiproc denied. requires login

Also, this same application does not properly escape metacharacters such as '$', '!', resulting in total system crash: http://x.x.x.x/manage/cgi/cgiproc?$

Nothing is found in the security/event logs after reboot.

Affected: --------

Tested on a Contivity 2500 running version 2.6 of the VxWorks OS. However, the cgiproc application has been (i believe) part of the package since their initial release, therefore earlier versions may also be affected.

Fix ---

I was finally able to contact Nortel about this on January 7, to open up a case (CR# 118887 - cgiproc 'bug', CR# 118890 - DoS). A patch has been developed and is scheduled to be released with their next shipment of the VxWorks package. Those administrators that have properly configured the switch, and placed adequate access control/filtering rules on the managemnt virtual ip should not have any immediate concerns.

-- John Daniele





   Page 1 of 1