Establishing Digital Trust: Don't Sacrifice Security for Convenience
Cobalt RaQ 4 server appliances and the CERT Coordination Center is warning that exploitation could lead to the code execution with superuser privileges.
A security advisory from CERT/CC warned of the vulnerability in Cobalt RaQ 4 servers running Sun's Security Hardening Package (SHP) and recommended server administrators apply vendor patches immediately. Alternatively, admins are urged to block access to the administrative httpd server (typically ports 81/TCP and 444/TCP) at the network perimeter.
Sun confirmed the remote root exploit if the SHP is installed (it does not install by default but many users choose to install it) and issued instructions on how to remove the flawed SHP patch.
The vulnerability was detected in a CGIhttps://o1.qnsr.com/log/p.gif?;n=203;c=204650394;s=9477;x=7936;f=201801171506010;u=j;z=TIMESTAMP;a=20392931;e=iThe center warned that an exploit was publicly available and might already be circulating.
script that did not properly filter input on the server. CERT/CC said the security flaw occurs because overflow.cgi does not adequately filter input destined for the email variable."Because of this flaw, an attacker can use a POST request to fill the email variable with arbitrary commands. The attacker can then call overflow.cgi, which will allow the command the attacker filled the email variable with to be executed with superuser privileges," it warned.