RhinoSoft DNS4ME HTTP Server Vulnerabilities
##########################################################
# GulfTech Security Research September, 16th 2004
##########################################################
# Vendor : RhinoSoft
# URL : http://www.dns4me.com/
# Version : RhinoSoft.com DNS4Me Web Server/3.0.0.4
# Risk : Cross Site Scripting && Denial of service
##########################################################
Description:
DNS4Me is the dynamic DNS service that you need to
start hosting your own Internet services. When you have
a dynamic IP address, you need something to associate a
static domain name with it to make it easier for visitors
to access the services you provide. With DNS4Me, you can
take control of your Web site by running your own HTTP
server. Without a hosting company, you've eliminated the
cost of hosting as well as a layer of contact between you
and your Web site. This gives you unparalleled control
overits configuration, content, and delivery. But the
benefits of dynamic DNS aren't just for HTTP servers. Any
service that can make use of a domain name can benefit from
DNS4Me. This includes FTP servers, e-mail servers, daemons
for today's popular computer games, NetMeeting. With the
reliability and excellent support you've come to expect of
RhinoSoft.com backing up DNS4Me, you'll get a powerful, no
hassle dynamic DNS solution. The RhinoSoft DNS4ME HTTP server
is prone to multiple vulnerabilities, and users are encouraged
to upgrade as soon as possible.
Cross Site Scripting:
It is possible for an attacker to render malicious code in
a victims browser by sending them a url to request a
document on the server(s), which contains A malformed query
string.
http://127.0.0.1/?%3E%3Cscript%3Ealert('XSS')%3C/script%3E
Any code in the query string will be executed and cause
cross site scripting.
Denial of Service:
RhinoSoft.com DNS4Me Web Server is vulnerable to Denial Of
Service attacks. If a malicious user sends a large amount
of data to port 80, or the port that the DNS4Me Web Server
is running on, it will send the CPU usage to 99% and
eventually crash the affected server.
Solution:
The developers were contacted last month about these issues.
They said they needed a month to resolve them. It has been
one month so users should check their website for an update.
Also, the RhinoSoft HTTP server may be included in other
RhinoSoft apps as well. Not sure of this, but something for
other researchers to look out for.
Related Info:
The original advisory can be found at the following location
http://www.gulftech.org/?node=research&article_id=00049-09162004
Credits:
James Bercegay of the GulfTech Security Research Team