Skip to content

TCLHttpd - Multiple Vulnerabilities

Description

"TclHttpd is used both as a general-purpose Web server, and as a framework for building server applications. It implements Tcl (http://www.tcl.tk), including the Tcl Resource Center and Scriptics' electronic commerce facilities. It works on Unix, Windows, and Macintosh. You can have the server up and running quickly."

More information at http://www.tcl.tk/software/tclhttpd

Summary
ProductTclHttpd
Severity
VendorTcl Developer Xchange
IdentifierN/A
Affected VersionsTCLHttpd <3.4.2</td>
Tested PlatformLinux(x86)

Multiple flaws in TCLHttpd server open door for an attacker to browse any directories on the remote host and to inject malicious javascript/vbscript content to the user's browser under the TCLHttpd server context (Cross Site Scripting).

Impact

Arbitrary Directory Browsing,

Inject malicious code.

Detail

[Vulnerability #1] Arbitrary Directory Browsing

When a user requests a directory on the TCLHttpd server, the script httpd@tclhttpd.tcl will start to look for various default index files in that directory. If none can be found then it will pass the operation to the dirlist.tcl script to do the "fancy" directory listing, which provides users the ability to sort files by modify date, name, or size or file's pattern. The dirlist.tcl script does filter inputs from the users in an attempt to prevent directory traversal but it can be easily bypassed if an absolute path is used instead. Directory listing is enabled by default.

For example:

Requesting http://cbc.com/images/?pattern=^&sortname will return you a list of directory under /.

Cross Site Scripting (XSS)

The TCLHttpd web server comes with various modules to increase the flexibility of the server. The /debug modules, which are enabled by default, allows one to download logging information, debug-up the tcl part of the application without restarting the hosting application. Many of the modules are found to be vulnerable to the infamous Cross Site Scripting (XSS) vulnerability that potentially enables a malicious user to "inject" code into a user's session under TCLHttpd server context.

Proof of Concept

[Vulnerability #1] Arbitrary Directory Browsing

Requesting http://cbc.com/images/?pattern=^&sortname will return you a list of directory under /.

Cross Site Scripting (XSS)

For example:

http://www.abc.com/debug/echo?name=<script>alert('hello');</script>

http://www.abc.com/debug/dbg?host=<script>alert('hello');</script>

http://www.abc.com/debug/showproc?proc=<script>alert('hello');</script>

http://www.abc.com/debug/error/info?title=<script>alert('hello');</script>

Vendor Status

Vendor has been notified and patch is also available here: http://www.tcl.tk/software/tclhttpd

Disclosure Timeline

N/A

Credit

Phuong Nguyen (ECQ)

Appendix

N/A

References

N/A