Check Point R55W Directory Traversal

2006.07.27
Risk: Low
Local: Yes
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

Overview Check Point Firewall-1 R55W contains a hard coded web server, which runs on TCP port 18264. This server is there to deal with PKI requirements for Check Point's VPN functionality. During a routine penetration test of a client, Sec-Tec discovered a directory traversal vulnerability that allows a potential attacker to retrieve files from the underlying OS. This issue is potentially serious for a number of reasons: 1. Check Point's "rule zero" will often by default allow access to this port for external IP addresses. 2. It would currently seem that there are few restrictions as to what files can be retrieved via this mechanism (Sec-Tec were able to obtain the underlying OS' account repository). Exploit The issue can be exploited via a web browser using typical hex encoded directory traversal strings. Affected Version(s): Check Point R55W Check Point R55W HFA1 Check Point R55W HFA2 (Confirmed on Windows 2003 Server platform, other platforms may be affected.) Current Status Check Point have confirmed that this issue was corrected in R55W HFA03. However, Sec-Tec have been unable to find any publicly available references to this issue, either within Check Point's knowledge base or HFA03 release notes. Updates to this issue will be found at: http://www.sec-tec.co.uk/vulnerability/r55w_directory_traversal.html Pete Foster Senior Consultant Sec-Tec Ltd


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top