BugTraq
Re: ISA Server 2004 Log Manipulation May 05 2006 06:16AM
Steven M. Christey (coley mitre org) (1 replies)
Re: ISA Server 2004 Log Manipulation May 05 2006 08:22AM
beSIRT (beSIRT beyondsecurity com) (1 replies)
On Friday 05 May 2006 09:16, Steven M. Christey wrote:
> >There is a Log Manipulation vulnerability in Microsoft ISA Server
> >2004, which when exploited will enable a malicious user to manipulate
> >the Destination Host parameter of the log file.
>
> ...
>
> >We were able to insert arbitrary characters, in this case the ASCII
> >characters 1, 2, 3 (respectively) into the Destination Host parameter
> >of the log file.

Just to clarify - these are the ASCII *values* 1,2,3 (or: 0x01, 0x02, 0x03).
You can potentially insert any ASCII value you want using character encoding.

>
> I'm curious about why you regard this as security-relevant. I do not
> know what you mean by "log manipulation".
>
You can insert the 'tab' value and possibly break 3rd party log analyzers.
Other interesting characters may be the EOF or EOD value, a "<" character for
CSS, and whatever else your heart desires.

As for the attack vectors, we think there's a lot you can do with being able
to inject practically arbitrary characters into a corporate firewall's logs,
but it's not our job to judge the severity of the problem, every ISA server
user should know if this is relevant for them.

>
> - Steve

--
beSIRT - Beyond Security's Incident Response Team
beSIRT (at) beyondsecurity (dot) com. [email concealed]

www.BeyondSecurity.com

[ reply ]
Re: ISA Server 2004 Log Manipulation May 06 2006 07:34PM
Thor (Hammer of God) (thor hammerofgod com)


 

Privacy Statement
Copyright 2010, SecurityFocus