COMMAND

    RBS

SYSTEMS AFFECTED

    Extent RBS 2.63 (possibly others; 2.5 is vulnerable)

PROBLEM

    'obscure'  found  following.   Any  user  can  get any file on the
    server.   Extent  RBS  ISP  is  a  full OSS package which combines
    RADIUS, user management, Web signup, billing, invoicing and  other
    valuable  features  that  let  you  grow  your IP service provider
    business.

    Extent RBS allows users to register a new subscription via  Credit
    Card  through  their  web  browser.   The  problem is that the web
    server  does  not  check  for  directory  transversal when reading
    image files.   Thus any file  available on the  same partition (in
    WinNT  or  any  file  on  the  *NIX  system)  which Extent RBS has
    permissions  to  read,  can  be  read  by  a malicious user.  This
    includes retrieving credit  card details, usernames  and passwords
    and more, which are stored in

        %HOMEDRIVE%\Program Files\<program directory>\database\rbsserv.mdb

    The URL relative to this file would be:

        http://localhost:8002/Newuser?Image=../../database/rbsserv.mdb

    The malicious user  (attacker/hacker/whatever) would just  connect
    to port 8002 of the Extent RBS ISP which allows anonymous  access,
    and retrieve  any file  on the  system like  Credit Card  Numbers,
    usernames and  passwords which  are stored  in RBSserv.mdb,  by pa
    ssing the  URL template  included below.   This assumes  that NTFS
    permissions are left in their default state.  URL template:

        http://<ip address>:8002/NewUser?image=<location of file to retrieve relative to the webroot directory>

    This has been only tested in WinNT version of Extent RBS.

SOLUTION

    Vendor was  contacted and  has confirmed  of issueing  a patch for
    WinNT, Linux and SunOS.