--- Advisory RFP9905 ------------------------------- rfp.labs ----------- Remote root compromise via Zeus webserver (Zeus-search vulnerability) --------------------------------- rain forest puppy / rfp@wiretrip.net -- Table of contents: - 1. Scope of problem - 2. Solution - 3. Miscellaneous Updates ------------------------------------------------------------------------- ----[ 1. Scope of problem Zeus is a high-performance webserver available from Zeus Technologies (www.zeus.co.uk). There's a myriad of problems, that when combined together, could yield a remote root compromise. Let's review the progression: -[ Bad search engine CGI This is really the core of the problem. Zeus has the option to setup a search engine for your virtual website(s). This feature is accessible via www.zeus.server/search (not /search/, big difference). If the engine is available (it's an optional feature), it can be used to request any file that's accessible by the web server uid (which is *asked for* on install...unwise administrators may pick 'root', which is a bad choice. We shall assume they pick the typical 'nobody'). The mechanism is in the search form: