Waraxe IT Security Portal
Login or Register
July 1, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 64
Members: 0
Total: 64
Full disclosure
SEC Consult SA-20240624-0 :: Multiple Vulnerabilities allowing complete bypass in Faronics WINSelect (Standard + Enterprise)
SEC Consult SA-20240620-0 :: Arbitrary File Upload in edu-sharing (metaVentis GmbH)
Zip Slip meets Artifactory: A Bug Bounty Story
Backdoor.Win32.Plugx / Insecure Permissions
[SBA-ADV-20240321-01] CVE-2024-5676: Paradox IP150 Internet Module Cross-Site Request Forgery
Microsoft leak of PlayReady developer / Warbird libs
Business Logic Flaw and Username Enumeration inspa-cartcmsv1.9.0.6
APPLE-SA-06-10-2024-1 visionOS 1.2
CyberDanube Security Research 20240604-0 | Multiple Vulnerabilities in utnserver Pro/ProMAX/INU-100
SEC Consult SA-20240606-0 :: Multiple critical vulnerabilities in Kiuwan SAST on-premise (KOP) & cloud/SaaS & Kiuwan Local Analyzer (KLA)
Blind SQL Injection - fengofficev3.11.1.2
Trojan.Win32.DarkGateLoad er (multi variants) / Arbitrary CodeExecution
SQL Injection Vulnerability in Boelter Blue System Management(version 1.3)
CyberDanube Security Research 20240528-0 | Multiple Vulnerabilities in ORing IAP-420
HNS-2024-06 - HN Security Advisory - Multiple vulnerabilities in Eclipse ThreadX
[waraxe-2005-SA#039] - Critical Sql Injection in Sgallery module for PhpNuke






Author: Janek Vind "waraxe"
Date: 12. January 2005
Location: Estonia, Tartu
Web: http://www.waraxe.us/advisory-39.html


Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Module's Name: SGallery
Module's Version: 1.01
Module's Description: Simple JPG image gallery
License: GNU/GPL
Author's Name: Sergey Kiselev
Author's Email: ser@acmetelecom.ru

Homepage: http://www.ser.acmetelecom.ru


Vulnerabilities:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Let's look at source code from imageview.php:


----------------[ original code ]---------------

require_once("$DOCUMENT_ROOT/config.php");
require_once("$DOCUMENT_ROOT/includes/sql_layer.php");

$dbi = sql_connect ($dbhost,$dbuname,$dbpass,$dbname);

if ($idalbum) {
$result = sql_query("select picture from ".$prefix."_SGalbums where idalbum=".$idalbum,$dbi);
} elseif ($idimage) {
$result = sql_query("select picture from ".$prefix."_SGimages where idimage=".$idimage,$dbi);
}

list($echo) = sql_fetch_row($result, $dbi);
sql_free_result($result);

sql_logout ($dbi);

header ("Content-Type: image/jpeg");
echo $echo;

----------------[ /original code ]---------------

Now let's analyze the weak points.


A - Full Path Disclosure
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

If "$idalbum" and "$idimage" are both unset, then because of the open "if/elseif" construction
there variable "$result" will be unset or can be poisoned through GET/POST/COOKIE.
And next call of the "sql_fetch_row()" will trigger generic php error messages, leading to
full path disclosure. Path disclosure is considered as low level security threat, but anyway it's
useful for further malicious actions.


B - Potential arbitrary file inclusion:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

This kind of code construction as

require_once("$DOCUMENT_ROOT/config.php");
require_once("$DOCUMENT_ROOT/includes/sql_layer.php");

is not very secure. Depending of the webserver software vendor,version number and configuration
settings it can lead to arbitrary file inclusion and possible remote file inclusion.


C - Critical sql injection bug in "imageview.php":
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Looking at source code, presented above, we can see unsecure sql queries directed to the database.
To be excact, user submitted variables "$idalbum" and/or "$idimage" are used in sql "SELECT" clause
without escaping with single quotes. This is clearly sql injection bug. Further exploitation will
depend on database software and version. In case of the mysql version 4.x with UNION functionality enabled,
arbitrary data can be retrieved from database, inluding admin(s) authentication credentials.
Traditionally, there is the proof of concept:


----------------[ real life exploit ]---------------

http://localhost/nuke75/modules/Sgallery/imageview.php?idimage=-99/**/UNION/
**/SELECT/**/pwd/**/FROM/**/nuke_authors/**/WHERE/**/radminsuper=1

----------------[/real life exploit ]---------------

Best browser to test this POC is MSIE - it will show plaintext admin password's md5 hash as needed.
Firefox and other browsers will mostly rendering out "broken picture" because of the
"Content-Type: image/jpeg" header. But anyway, sql injection exists, can be exploited and must be
fixed by vendor as soon as possible.


How to fix:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Developer first contacted: 16. November 2004
No response from developer after multiple sent emails.
Downloadable version of the Sgalley is still unpatched.

How to fix this security hole - http://www.waraxe.us/forums.html


Additional resources:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Base64 encoder and decoder - http://base64-encoder-online.waraxe.us/
SiteMapper - free php script for phpNuke powered websites - http://sitemapper.waraxe.us/
It's easy to install solution for making phpNuke more Google friendly!


Greetings:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Greets to icenix, Raido Kerna, g0df4th3r and slimjim100!
Tervitused - Heintz!

Contact:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

come2waraxe@yahoo.com
Janek Vind "waraxe"

Homepage: http://www.waraxe.us/

---------------------------------- [ EOF ] ------------------------------------









Copyright © by Waraxe IT Security Portal All Right Reserved.

Published on: 2005-01-12 (31496 reads)

[ Go Back ]
Top members by posts
waraxe  waraxe - 2407
vince213333  vince213333 - 737
pexli  pexli - 665
Mullog  Mullog - 540
demon  demon - 485
shai-tan  shai-tan - 477
LINUX  LINUX - 404
Cyko  Cyko - 375
tsabitah  tsabitah - 328
y3dips  y3dips - 281
Cybercrime news
Mac Users Served Info Stealer Malware Through Google Ads
Deadline Looms For Alleged LockBit Extortion Over Feds Of 33TB Of Data
Cyber Attack Compromised Indonesian Datacenter, Ransom Sought
CDK Global Begins To Restore Systems After Cyber Attack Hits Thousands Of Retailers
Ransomware Group Exploits PHP Vulnerability Days After Disclosure
GitHub Phishing Campaign Wipes Repos, Extorts Victims
Ransomware Gangs Are Adopting More Brutal Tactics Amidst Crackdowns
Security Industry Has RaaS Model Wrong, Says Expert
Ransomware Attack Disrupting London Hospitals
Cybercrooks Get Cozy With BoxedApp To Dodge Detection
OpenAI Report Reveals Threat Actors Using ChatGPT In Influence Operations
Law Enforcement Operation Takes Aim At An Often Overlooked Cybercrime Lynchpin
Best Buy / Geek Squad Most Impersonated By Scammers In 2023
New Ransomware Uses BitLocker To Encrypt Victim Data
London Drugs Waiting On LockBit's Next Move
LockBit Dethroned As Ransomware Leader Since Takedown
Microsoft Quick Assist Tool Abused For Ransomware Delivery
FCC Names And Shames Royal Tiger AI Robocall Crew
Ascension Making Progress After Ransomware Attack
500,000 Impacted By Ohio Lottery Ransomware Attack
LockBit Takes Credit For City Of Wichita Ransomware Attack
Botnet Disrupted By FBI Still Used By Russian Spies, Cybercriminals
REvil Ransomware Scum Gets 14 Years, $16 Million Fine
Hacker Jailed For Blackmailing Therapy Patients
Hackers Are Using Developing Countries For Ransomware Practice
Hacker news
Russian APT Reportedly Behind New TeamViewer Hack
Designed Receivable Solutions Data Breach Impacts 585,000 People
New MOVEit Critical Bug Sees Swift Exploitation Attempts
WhisperGate Suspect Indicted As US Offers A $10 Million Bounty
Polyfill Supply Chain Attack Hits Over 100k Websites
P2Pinfect Worm Now Dropping Ransomware On Redis Servers
Deadline Looms For Alleged LockBit Extortion Over Feds Of 33TB Of Data
Julian Assange Pleads Guilty, Goes Home
Neiman Marcus Data Breach Exposed As Hacker Offers To Sell Stolen Info
Zip Slip Meets Artifactory: A Bug Bounty Story
Snowflake Breach Snowballs With More Victims
Cyber Attack Compromised Indonesian Datacenter, Ransom Sought
CDK Global Begins To Restore Systems After Cyber Attack Hits Thousands Of Retailers
Levi's And More Affected In Pants Dropping Week Of Data Breaches
Car Dealerships Disrupted As CDK Hack Worsens
Amtrak Confirms Crooks Are Breaking Into User Accounts, Derailing Email Addresses
F5 Big-IP Appliances Exploited For 3 Years By China Linked Group
AMD Investigating Breach Claims After Hacker Offers To Sell Data
Change Healthcare Attack Financial Support Ends
New BadSpace Backdoor Deployed In Drive-By Attacks
How ShinyHunters Hackers Allegedly Pilfered Ticketmaster Data From Snowflake
Notorious Cyber Gang UNC3944 Attacks vSphere And Azure To Run VMs Inside Victims' Infrastructure
UK Man Suspected Of Being Scattered Spider Leader Arrested
Life360 Says Hacker Stole Customer Data
Ukrainian Cops Collar Kyiv Programmer Believed To Be Conti, LockBit Linchpin
Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.163 Seconds