The CyberUnderground http://cyberunderground.cjb.net Remote root compromise via Zeus webserver K2K's NOTE: This is an exploit for the Zeus Webserver. Oftentimes, admins will install some other webserver (Apache, or whatever), and use the Web Administration portion of Zeus. This is basically a web fronted to administer the server, and usually sits on port 9090. So: if you ever see tcp port 9090 open on a box, it may be vulnerable. (xploit by RainForestPuppy) ----[ 1. Scope of problem Zeus is a high-performance webserver available from Zeus Technologies (www.zeus.co.uk). There's a myriad of problems, that when combined together, could yield a remote root compromise. Let's review the progression: -[ Bad search engine CGI This is really the core of the problem. Zeus has the option to setup a search engine for your virtual website(s). This feature is accessible via www.zeus.server/search (not /search/, big difference). If the engine is available (it's an optional feature), it can be used to request any file that's accessible by the web server uid (which is *asked for* on install...unwise administrators may pick 'root', which is a bad choice. We shall assume they pick the typical 'nobody'). The mechanism is in the search form: