ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Breaking into Ubuntu Server

    Scheduled Pinned Locked Moved IT Discussion
    22 Posts 9 Posters 2.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @DustinB3403
      last edited by

      @DustinB3403 said in Breaking into Ubuntu Server:

      Which is it Ubuntu or CentOS?

      I assume you only have remote access?

      Web access, port 80.

      1 Reply Last reply Reply Quote 0
      • DashrenderD
        Dashrender
        last edited by

        lol are you allowed to ask for help on your test 😛

        1 Reply Last reply Reply Quote 1
        • scottalanmillerS
          scottalanmiller
          last edited by

          said in Breaking into Ubuntu Server:

          2.2.22

           low: XSS in mod_negotiation when untrusted uploads are supported CVE-2012-2687
          
          Possible XSS for sites which use mod_negotiation and allow untrusted uploads to locations which have MultiViews enabled.
          
          Note: This issue is also known as CVE-2008-0455.
          Reported to security team: 31st May 2012
          Issue public: 13th June 2012
          Update Released: 13th September 2012
          Affects: 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
          
          low: insecure LD_LIBRARY_PATH handling CVE-2012-0883
          
          Insecure handling of LD_LIBRARY_PATH was found that could lead to the current working directory to be searched for DSOs. This could allow a local user to execute code as root if an administrator runs apachectl from an untrusted directory.
          Reported to security team: 14th February 2012
          Issue public: 2nd March 2012
          Update Released: 13th September 2012
          Affects: 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
          
          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller
            last edited by

             low: mod_rewrite log escape filtering CVE-2013-1862
            
            mod_rewrite does not filter terminal escape sequences from logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences.
            
            Acknowledgements: This issue was reported by Ramiro Molina
            Reported to security team: 13th March 2013
            Issue public: 19th April 2013
            Update Released: 22nd July 2013
            Affects: 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
            
            moderate: mod_dav crash CVE-2013-1896
            
            Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault.
            
            Acknowledgements: This issue was reported by Ben Reser
            Reported to security team: 7th March 2013
            Issue public: 23rd May 2013
            Update Released: 22nd July 2013
            Affects: 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
            
            1 Reply Last reply Reply Quote 1
            • scottalanmillerS
              scottalanmiller
              last edited by

               low: mod_log_config crash CVE-2014-0098
              
              A flaw was found in mod_log_config. A remote attacker could send a specific truncated cookie causing a crash. This crash would only be a denial of service if using a threaded MPM.
              
              Acknowledgements: This issue was reported by Rainer M Canavan
              Reported to security team: 25th February 2014
              Issue public: 17th March 2014
              Update Released: 26th March 2014
              Affects: 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
              
              moderate: mod_dav crash CVE-2013-6438
              
              XML parsing code in mod_dav incorrectly calculates the end of the string when removing leading spaces and places a NUL character outside the buffer, causing random crashes. This XML parsing code is only used with DAV provider modules that support DeltaV, of which the only publicly released provider is mod_dav_svn.
              
              Acknowledgements: This issue was reported by Ning Zhang & Amin Tora of Neustar
              Reported to security team: 10th December 2013
              Issue public: 17th March 2014
              Update Released: 26th March 2014
              Affects: 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
              
              1 Reply Last reply Reply Quote 1
              • scottalanmillerS
                scottalanmiller
                last edited by

                 important: mod_cgid denial of service CVE-2014-0231
                
                A flaw was found in mod_cgid. If a server using mod_cgid hosted CGI scripts which did not consume standard input, a remote attacker could cause child processes to hang indefinitely, leading to denial of service.
                
                Acknowledgements: This issue was reported by Rainer Jung of the ASF
                Reported to security team: 16th June 2014
                Issue public: 14th July 2014
                Update Released: 3rd September 2014
                Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                
                low: HTTP Trailers processing bypass CVE-2013-5704
                
                HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier.
                
                This fix adds the "MergeTrailers" directive to restore legacy behavior.
                
                Acknowledgements: This issue was reported by Martin Holst Swende.
                Reported to security team: 6th September 2013
                Issue public: 19th October 2013
                Update Released: 3rd September 2014
                Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                
                moderate: mod_deflate denial of service CVE-2014-0118
                
                A resource consumption flaw was found in mod_deflate. If request body decompression was configured (using the "DEFLATE" input filter), a remote attacker could cause the server to consume significant memory and/or CPU resources. The use of request body decompression is not a common configuration.
                
                Acknowledgements: This issue was reported by Giancarlo Pellegrino and Davide Balzarotti
                Reported to security team: 19th February 2014
                Issue public: 14th July 2014
                Update Released: 3rd September 2014
                Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                
                moderate: mod_status buffer overflow CVE-2014-0226
                
                A race condition was found in mod_status. An attacker able to access a public server status page on a server using a threaded MPM could send a carefully crafted request which could lead to a heap buffer overflow. Note that it is not a default or recommended configuration to have a public accessible server status page.
                
                Acknowledgements: This issue was reported by Marek Kroemeke, AKAT-1 and 22733db72ab3ed94b5f8a1ffcde850251fe6f466 via HP ZDI
                Reported to security team: 30th May 2014
                Issue public: 14th July 2014
                Update Released: 3rd September 2014
                Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
                
                1 Reply Last reply Reply Quote 1
                • IRJI
                  IRJ
                  last edited by

                  Thanks @scottalanmiller , but I already saw those and known of them help me. XSS isn't possible when there is no website on the box. The apache service is all that is running. A DoS is nice for an attack, but it doesn't help me gain access.

                  1 Reply Last reply Reply Quote 0
                  • dafyreD
                    dafyre
                    last edited by

                    What error do you get when trying to browse to it?

                    Could it be the site is listening only on the IP address and not listening for any particular hostname?

                    IRJI 1 Reply Last reply Reply Quote 0
                    • IRJI
                      IRJ @dafyre
                      last edited by

                      @dafyre said in Breaking into Ubuntu Server:

                      What error do you get when trying to browse to it?

                      Could it be the site is listening only on the IP address and not listening for any particular hostname?

                      no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.

                      I did an http vuln scan and the only file it sees is index.html which is just the default page.

                      dafyreD 1 Reply Last reply Reply Quote 0
                      • dafyreD
                        dafyre @IRJ
                        last edited by

                        @IRJ said in Breaking into Ubuntu Server:

                        @dafyre said in Breaking into Ubuntu Server:

                        What error do you get when trying to browse to it?

                        Could it be the site is listening only on the IP address and not listening for any particular hostname?

                        no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.

                        I did an http vuln scan and the only file it sees is index.html which is just the default page.

                        Time to throw out Scott's favorite word: Red Herring ?

                        IRJI BRRABillB stacksofplatesS 3 Replies Last reply Reply Quote 0
                        • IRJI
                          IRJ @dafyre
                          last edited by

                          @dafyre said in Breaking into Ubuntu Server:

                          @IRJ said in Breaking into Ubuntu Server:

                          @dafyre said in Breaking into Ubuntu Server:

                          What error do you get when trying to browse to it?

                          Could it be the site is listening only on the IP address and not listening for any particular hostname?

                          no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.

                          I did an http vuln scan and the only file it sees is index.html which is just the default page.

                          Time to throw out Scott's favorite word: Red Herring ?

                          There are plenty of decoys so it wouldn't surprise me.

                          1 Reply Last reply Reply Quote 0
                          • BRRABillB
                            BRRABill @dafyre
                            last edited by

                            @dafyre said in Breaking into Ubuntu Server:

                            @IRJ said in Breaking into Ubuntu Server:

                            @dafyre said in Breaking into Ubuntu Server:

                            What error do you get when trying to browse to it?

                            Could it be the site is listening only on the IP address and not listening for any particular hostname?

                            no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.

                            I did an http vuln scan and the only file it sees is index.html which is just the default page.

                            Time to throw out Scott's favorite word: Red Herring ?

                            If you only knew how many times I've seen that already today.

                            1 Reply Last reply Reply Quote 2
                            • stacksofplatesS
                              stacksofplates @dafyre
                              last edited by

                              @dafyre said in Breaking into Ubuntu Server:

                              @IRJ said in Breaking into Ubuntu Server:

                              @dafyre said in Breaking into Ubuntu Server:

                              What error do you get when trying to browse to it?

                              Could it be the site is listening only on the IP address and not listening for any particular hostname?

                              no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.

                              I did an http vuln scan and the only file it sees is index.html which is just the default page.

                              Time to throw out Scott's favorite word: Red Herring ?

                              There is nothing extra in the index.html?

                              No port knocking set up for another port?

                              IRJI 1 Reply Last reply Reply Quote 0
                              • IRJI
                                IRJ @stacksofplates
                                last edited by

                                @stacksofplates said in Breaking into Ubuntu Server:

                                @dafyre said in Breaking into Ubuntu Server:

                                @IRJ said in Breaking into Ubuntu Server:

                                @dafyre said in Breaking into Ubuntu Server:

                                What error do you get when trying to browse to it?

                                Could it be the site is listening only on the IP address and not listening for any particular hostname?

                                no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.

                                I did an http vuln scan and the only file it sees is index.html which is just the default page.

                                Time to throw out Scott's favorite word: Red Herring ?

                                There is nothing extra in the index.html?

                                No port knocking set up for another port?

                                Not that I can see. I used Acunetix Web Vulnerability Scanner and it does a pretty good job of analyzing the files.

                                1 Reply Last reply Reply Quote 1
                                • stacksofplatesS
                                  stacksofplates
                                  last edited by

                                  As an aside, this sounds like a really interesting test.

                                  1 Reply Last reply Reply Quote 0
                                  • MattSpellerM
                                    MattSpeller
                                    last edited by

                                    I find that a slot and phillips #2 are enough for most.

                                    Occasionally I have to break out the baseball bat or crowbar but those are really more for my pleasure than anything.

                                    1 Reply Last reply Reply Quote 1
                                    • stacksofplatesS
                                      stacksofplates
                                      last edited by

                                      Did you figures it out? You've kind of inspired me. I kind of want to go through the OSCP now.

                                      IRJI 1 Reply Last reply Reply Quote 0
                                      • IRJI
                                        IRJ @stacksofplates
                                        last edited by

                                        @stacksofplates said in Breaking into Ubuntu Server:

                                        Did you figures it out? You've kind of inspired me. I kind of want to go through the OSCP now.

                                        Yes I did figure it out. PM me and I can tell you the resolution.

                                        1 Reply Last reply Reply Quote 0
                                        • 1
                                        • 2
                                        • 2 / 2
                                        • First post
                                          Last post