Breaking into Ubuntu Server
-
important: mod_cgid denial of service CVE-2014-0231 A flaw was found in mod_cgid. If a server using mod_cgid hosted CGI scripts which did not consume standard input, a remote attacker could cause child processes to hang indefinitely, leading to denial of service. Acknowledgements: This issue was reported by Rainer Jung of the ASF Reported to security team: 16th June 2014 Issue public: 14th July 2014 Update Released: 3rd September 2014 Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0 low: HTTP Trailers processing bypass CVE-2013-5704 HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier. This fix adds the "MergeTrailers" directive to restore legacy behavior. Acknowledgements: This issue was reported by Martin Holst Swende. Reported to security team: 6th September 2013 Issue public: 19th October 2013 Update Released: 3rd September 2014 Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0 moderate: mod_deflate denial of service CVE-2014-0118 A resource consumption flaw was found in mod_deflate. If request body decompression was configured (using the "DEFLATE" input filter), a remote attacker could cause the server to consume significant memory and/or CPU resources. The use of request body decompression is not a common configuration. Acknowledgements: This issue was reported by Giancarlo Pellegrino and Davide Balzarotti Reported to security team: 19th February 2014 Issue public: 14th July 2014 Update Released: 3rd September 2014 Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0 moderate: mod_status buffer overflow CVE-2014-0226 A race condition was found in mod_status. An attacker able to access a public server status page on a server using a threaded MPM could send a carefully crafted request which could lead to a heap buffer overflow. Note that it is not a default or recommended configuration to have a public accessible server status page. Acknowledgements: This issue was reported by Marek Kroemeke, AKAT-1 and 22733db72ab3ed94b5f8a1ffcde850251fe6f466 via HP ZDI Reported to security team: 30th May 2014 Issue public: 14th July 2014 Update Released: 3rd September 2014 Affects: 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
-
Thanks @scottalanmiller , but I already saw those and known of them help me. XSS isn't possible when there is no website on the box. The apache service is all that is running. A DoS is nice for an attack, but it doesn't help me gain access.
-
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
-
@dafyre said in Breaking into Ubuntu Server:
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.
I did an http vuln scan and the only file it sees is index.html which is just the default page.
-
@IRJ said in Breaking into Ubuntu Server:
@dafyre said in Breaking into Ubuntu Server:
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.
I did an http vuln scan and the only file it sees is index.html which is just the default page.
Time to throw out Scott's favorite word: Red Herring ?
-
@dafyre said in Breaking into Ubuntu Server:
@IRJ said in Breaking into Ubuntu Server:
@dafyre said in Breaking into Ubuntu Server:
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.
I did an http vuln scan and the only file it sees is index.html which is just the default page.
Time to throw out Scott's favorite word: Red Herring ?
There are plenty of decoys so it wouldn't surprise me.
-
@dafyre said in Breaking into Ubuntu Server:
@IRJ said in Breaking into Ubuntu Server:
@dafyre said in Breaking into Ubuntu Server:
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.
I did an http vuln scan and the only file it sees is index.html which is just the default page.
Time to throw out Scott's favorite word: Red Herring ?
If you only knew how many times I've seen that already today.
-
@dafyre said in Breaking into Ubuntu Server:
@IRJ said in Breaking into Ubuntu Server:
@dafyre said in Breaking into Ubuntu Server:
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.
I did an http vuln scan and the only file it sees is index.html which is just the default page.
Time to throw out Scott's favorite word: Red Herring ?
There is nothing extra in the index.html?
No port knocking set up for another port?
-
@stacksofplates said in Breaking into Ubuntu Server:
@dafyre said in Breaking into Ubuntu Server:
@IRJ said in Breaking into Ubuntu Server:
@dafyre said in Breaking into Ubuntu Server:
What error do you get when trying to browse to it?
Could it be the site is listening only on the IP address and not listening for any particular hostname?
no error. Just a default page that says "It works!" This is the default page for this server. The web server software is running, but no content has been added yet.
I did an http vuln scan and the only file it sees is index.html which is just the default page.
Time to throw out Scott's favorite word: Red Herring ?
There is nothing extra in the index.html?
No port knocking set up for another port?
Not that I can see. I used Acunetix Web Vulnerability Scanner and it does a pretty good job of analyzing the files.
-
As an aside, this sounds like a really interesting test.
-
I find that a slot and phillips #2 are enough for most.
Occasionally I have to break out the baseball bat or crowbar but those are really more for my pleasure than anything.
-
Did you figures it out? You've kind of inspired me. I kind of want to go through the OSCP now.
-
@stacksofplates said in Breaking into Ubuntu Server:
Did you figures it out? You've kind of inspired me. I kind of want to go through the OSCP now.
Yes I did figure it out. PM me and I can tell you the resolution.