"Zeus Web Server is the most scalable, secure and
high-performance web server software available,, underpinning business-critical
solutions for the world's leading web hosting, content provider and
secure e-commerce companies." (from: www.zeus.com)
Emm,... :-) another XSS, now on the ZEUS web admin interface.
The tested software is Zeus 4.2r2 (webadmin-4.2r2) on Linux x86.
This is not the same issue as bugtraq bid 6144 (index.fcgi),
now is on "vs_diag.cgi". Exploit is simple: http://<target>:9090/apps/web/vs_diag.cgi?server=<YOUR_CODE>
I have read this post: (http://www.securityfocus.com/archive/1/302961),
regarding "index.fcgi" XSS.
Mr, Colin Watson, claims that XSS bug on their software is not a
big risk because: "The Zeus Administration Server
of the folding list of groups of virtualservers, and the list
of currently monitored variables and machines ifreal-time
Who needs cookies? :-) ZEUS uses "Basic Auth" (base 64
encoded) for the session tracking...but ZEUS does not allow http TRACE
method, so we can not run a Cross Site Tracing against
I know litle about client side scripting, but probably there's some
way to send POST requests and... change the admin password?, stop
the web server?... I'm quite sure there's some way to do this. With
the script we show below an attacker can do an HTTP request to the
web admin interface of the ZEUS and redirect the output...
Of course you have to trick the admin...
This is for IE, for other browsers you may modify this code.
Imagination is the best friend of the attacker. Open your minds, XSS
does not only means execution of commands on the client side... succefully
exploited, in some scenarios (like web admin interfaces), those bugs
can lead on execution of actions on the server side...
Hugo Vázquez Caramés & Toni Cortés Martínez
INFOHACKING RESEARCH 2003