full-disclosure-uk May 2007 archive
Main Archive Page > Month Archives  > full-disclosure-uk archives
full-disclosure-uk: Re: [Full-disclosure] Teamspeak Server 2.0.2

Re: [Full-disclosure] Teamspeak Server Vulnerabilities

From: Mads Behrendt Petersen <mbp_at_nospam>
Date: Fri May 11 2007 - 14:45:22 GMT
To: "Gilberto Ficara" <g.ficara@oltrelinux.com>, <full-disclosure@lists.grok.org.uk>

This isn't a software error, but a design flaw. Don't give a registered user access to the webinterface, simple as that.

It's like the keyboard shortcuts to give SA to users

-----Oprindelig meddelelse-----
Fra: full-disclosure-bounces@lists.grok.org.uk [mailto:full-disclosure-bounces@lists.grok.org.uk] På vegne af Gilberto Ficara Sendt: 11. maj 2007 15:53
Til: full-disclosure@lists.grok.org.uk
Emne: [Full-disclosure] Teamspeak Server Vulnerabilities

Hi everyone,
several months ago I discovered some vulnerabilities in TeamSpeak Server WebAdmin interface.

I sent the advisory and exploit to the developers about two months ago (11 03 2007), but the server is still vulnerable, today.

Affected software: Teamspeak Server

Looks like the beta build isn't affected (or at least my exploit doesn't work on that).

  1. Privilege escalation can lead to Service Abuse or Denial of Service =======================================================================

TeamSpeak server is based on a "site" and multiple "virtual servers".

On each "site" there are one or more SuperAdmin users that can manage the site configuration, adding more SuperAdmin users, adding, starting, stopping or removing virtual servers or even manage each single server, by selecting it from the web interface or the text-based one.

Each virtual server has one or more ServerAdmin users that can modify virtual server parameters (like the name), adding new users for the specified server (also new ServerAdmin users) and modify user privileges relative to that virtual server.

The problem lies on the RegisteredUser privileges configuration page: in that page are listed privileges intended to be associated to the SuperAdmin role, like AdminAddServer or AdminStartServer. By activating these privileges for the RegisteredUsers role, loggin in with a new RegisteredUser account and doing some simple url tampering it is possible to CREATE, START, STOP and DELETE virtual servers to the site, without SuperAdmin access.

What is required:

  • ServerAdmin access to the web interface

Here is a simple exploit pattern:

Pages ok_box.html and error_box.html are vulnerable to common Cross Site Scripting attacks:

http://your_ts_server_here:14534/error_box.html?error_title=session expired - please
login&error_text=<form action="">User: <input
type="text"><br>Pass: <input type="password"><br><br><input type="submit"></form>&error_url=index.html

http://webadmin_uri:14534/ok_box.html?ok_title=%3Cscript% 3Ealert('hello')%3C/script%3E


Disable WebAdmin access.
Upgrade to beta release.

Gilberto Ficara

(sorry for my bad english :))

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/