Attacks/Breaches
8/30/2007
10:00 AM
50%
50%

When Web Servers Attack

Even in a DMZ, a Web server can be a dangerous weapon

6:00 AM -- Web technology has added lots of complexity to security. Aside from issues of design, secure coding, and protecting user information, Web technology gives rise to a number of new threats. One such threat is using the Web server as a proxy to hack other devices on the same network.

Using one machine to scan or attack another isn't a new concept. For instance, take the concept of idle scan, which uses one machine to do reconnaissance on a target using TCP sequencing.

Just this week, I published a paper on a new attack that takes place via a Web server running in a DMZ. That DMZ may have many machines sitting in it -- development machines, database machines, staging machines, QA machines, customer machines, and others -- connected by the same network. In many cases, this is the most important part of the network to penetrate, because often, this is where all of the most important corporate assets live.

DMZs often are improperly built, allowing any machine on the network to connect out to the world. This configuration makes patch management and software downloading easy, but it also opens up those devices to attack.

Because the Web server and the other devices coexist on a common LAN in the DMZ, we can use the Web server to attack the other devices. For example, we can employ image-uploading scripts that pull content from the Internet.

Figure 1:

In this example, instead of requesting something on the Internet, we request something from the intranet -- or the same LAN that the DMZ lives on. Because the request doesn't actually have to be an image, we can ask the Web server to perform PHP remote file includes, command injection, or injection of an xp_cmdshell via SQL injection.

Once the Web server attacks the other machine on the same network, that machine can connect back out to the Internet and make a connection with the attacker. The attacker now has the ability to execute any command he wants on a server in the DMZ.

Although this situation is not common, it exemplifies one of the security oddities presented by modern Web design, which is sometimes done without an understanding of good network design. Simple egress filtering at the firewall -- or insuring the software you use to download images does not allow connections to internal address spaces -- could fix this issue.

The real question is: How many people will take the initiative and fix these vulnerabilities before the bad guys find them?

— RSnake is a red-blooded lumberjack whose rants can also be found at Ha.ckers and F*the.net. Special to Dark Reading

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3971
Published: 2014-12-25
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.

CVE-2014-7193
Published: 2014-12-25
The Crumb plugin before 3.0.0 for Node.js does not properly restrict token access in situations where a hapi route handler has CORS enabled, which allows remote attackers to obtain sensitive information, and potentially obtain the ability to spoof requests to non-CORS routes, via a crafted web site ...

CVE-2004-2771
Published: 2014-12-24
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.

CVE-2014-3569
Published: 2014-12-24
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshak...

CVE-2014-4322
Published: 2014-12-24
drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or c...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.