Breaking into Ubuntu Server
-
@DustinB3403 said in Breaking into Ubuntu Server:
Which is it Ubuntu or CentOS?
I assume you only have remote access?
Web access, port 80.
-
lol are you allowed to ask for help on your test
-
said in Breaking into Ubuntu Server:
2.2.22
low: XSS in mod_negotiation when untrusted uploads are supported CVE-2012-2687 Possible XSS for sites which use mod_negotiation and allow untrusted uploads to locations which have MultiViews enabled. Note: This issue is also known as CVE-2008-0455. Reported to security team: 31st May 2012 Issue public: 13th June 2012 Update Released: 13th September 2012 Affects: 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0 low: insecure LD_LIBRARY_PATH handling CVE-2012-0883 Insecure handling of LD_LIBRARY_PATH was found that could lead to the current working directory to be searched for DSOs. This could allow a local user to execute code as root if an administrator runs apachectl from an untrusted directory. Reported to security team: 14th February 2012 Issue public: 2nd March 2012 Update Released: 13th September 2012 Affects: 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
-
low: mod_rewrite log escape filtering CVE-2013-1862 mod_rewrite does not filter terminal escape sequences from logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences. Acknowledgements: This issue was reported by Ramiro Molina Reported to security team: 13th March 2013 Issue public: 19th April 2013 Update Released: 22nd July 2013 Affects: 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0 moderate: mod_dav crash CVE-2013-1896 Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault. Acknowledgements: This issue was reported by Ben Reser Reported to security team: 7th March 2013 Issue public: 23rd May 2013 Update Released: 22nd July 2013 Affects: 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
-
low: mod_log_config crash CVE-2014-0098 A flaw was found in mod_log_config. A remote attacker could send a specific truncated cookie causing a crash. This crash would only be a denial of service if using a threaded MPM. Acknowledgements: This issue was reported by Rainer M Canavan Reported to security team: 25th February 2014 Issue public: 17th March 2014 Update Released: 26th March 2014 Affects: 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0 moderate: mod_dav crash CVE-2013-6438 XML parsing code in mod_dav incorrectly calculates the end of the string when removing leading spaces and places a NUL character outside the buffer, causing random crashes. This XML parsing code is only used with DAV provider modules that support DeltaV, of which the only publicly released provider is mod_dav_svn. Acknowledgements: This issue was reported by Ning Zhang & Amin Tora of Neustar Reported to security team: 10th December 2013 Issue public: 17th March 2014 Update Released: 26th March 2014 Affects: 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
-
important: mod_cgid denial of service CVE-2014-0231 A flaw was found in mod_cgid. If a server using mod_cgid hosted CGI scripts which did not consume standard input, a remote attacker could cause child processes to hang indefinitely, leading to denial of service. Acknowledgements: This issue was reported by Rainer Jung of the ASF Reported to security team: 16th June 2014 Issue public: 14th July 2014 Update Released: 3rd September 2014 Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0 low: HTTP Trailers processing bypass CVE-2013-5704 HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier. This fix adds the "MergeTrailers" directive to restore legacy behavior. Acknowledgements: This issue was reported by Martin Holst Swende. Reported to security team: 6th September 2013 Issue public: 19th October 2013 Update Released: 3rd September 2014 Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0 moderate: mod_deflate denial of service CVE-2014-0118 A resource consumption flaw was found in mod_deflate. If request body decompression was configured (using the "DEFLATE" input filter), a remote attacker could cause the server to consume significant memory and/or CPU resources. The use of request body decompression is not a common configuration. Acknowledgements: This issue was reported by Giancarlo Pellegrino and Davide Balzarotti Reported to security team: 19th February 2014 Issue public: 14th July 2014 Update Released: 3rd September 2014 Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0 moderate: mod_status buffer overflow CVE-2014-0226 A race condition was found in mod_status. An attacker able to access a public server status page on a server using a threaded MPM could send a carefully crafted request which could lead to a heap buffer overflow. Note that it is not a default or recommended configuration to have a public accessible server status page. Acknowledgements: This issue was reported by Marek Kroemeke, AKAT-1 and 22733db72ab3ed94b5f8a1ffcde850251fe6f466 via HP ZDI Reported to security team: 30th May 2014 Issue public: 14th July 2014 Update Released: 3rd September 2014 Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
-
Thanks @scottalanmiller , but I already saw those and known of them help me. XSS isn't possible when there is no website on the box. The apache service is all that is running. A DoS is nice for an attack, but it doesn't help me gain access.
-
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
-
@dafyre said in Breaking into Ubuntu Server:
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.
I did an http vuln scan and the only file it sees is index.html which is just the default page.
-
@IRJ said in Breaking into Ubuntu Server:
@dafyre said in Breaking into Ubuntu Server:
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.
I did an http vuln scan and the only file it sees is index.html which is just the default page.
Time to throw out Scott's favorite word: Red Herring ?
-
@dafyre said in Breaking into Ubuntu Server:
@IRJ said in Breaking into Ubuntu Server:
@dafyre said in Breaking into Ubuntu Server:
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.
I did an http vuln scan and the only file it sees is index.html which is just the default page.
Time to throw out Scott's favorite word: Red Herring ?
There are plenty of decoys so it wouldn't surprise me.
-
@dafyre said in Breaking into Ubuntu Server:
@IRJ said in Breaking into Ubuntu Server:
@dafyre said in Breaking into Ubuntu Server:
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.
I did an http vuln scan and the only file it sees is index.html which is just the default page.
Time to throw out Scott's favorite word: Red Herring ?
If you only knew how many times I've seen that already today.
-
@dafyre said in Breaking into Ubuntu Server:
@IRJ said in Breaking into Ubuntu Server:
@dafyre said in Breaking into Ubuntu Server:
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.
I did an http vuln scan and the only file it sees is index.html which is just the default page.
Time to throw out Scott's favorite word: Red Herring ?
There is nothing extra in the index.html?
No port knocking set up for another port?
-
@stacksofplates said in Breaking into Ubuntu Server:
@dafyre said in Breaking into Ubuntu Server:
@IRJ said in Breaking into Ubuntu Server:
@dafyre said in Breaking into Ubuntu Server:
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.
I did an http vuln scan and the only file it sees is index.html which is just the default page.
Time to throw out Scott's favorite word: Red Herring ?
There is nothing extra in the index.html?
No port knocking set up for another port?
Not that I can see. I used Acunetix Web Vulnerability Scanner and it does a pretty good job of analyzing the files.
-
As an aside, this sounds like a really interesting test.
-
I find that a slot and phillips #2 are enough for most.
Occasionally I have to break out the baseball bat or crowbar but those are really more for my pleasure than anything.
-
Did you figures it out? You've kind of inspired me. I kind of want to go through the OSCP now.
-
@stacksofplates said in Breaking into Ubuntu Server:
Did you figures it out? You've kind of inspired me. I kind of want to go through the OSCP now.
Yes I did figure it out. PM me and I can tell you the resolution.