Author: Janek Vind "waraxe"
Date: 23. April 2004
Location: Estonia, Tartu
Web: http://www.waraxe.us/index.php?modname=sa&id=24
Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This script takes a given hostname or IP address and attempts to
look up all sorts of information about that address. Basically
it does what network-tools.com does, without all the ads and ASP :)
COPYRIGHT shaun@shat.net
Homepage: http://www.shat.net/php/nqt/
Vulnerabilities:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
A. Full path disclosure:
A1 - unchecked user submitted variable "portNum"
If we make http request like this:
http://localhost/nuke72/admin/modules/blocker_query.php?target=foobar.com&queryType=all&portNum=foobar
... then we will see standard php error messages, revealing full path to script:
Warning: fsockopen() expects parameter 2 to be long, string given in D:apache_wwwroot
uke72adminmoduleslocker_query.php on line 305
Port foobar does not appear to be open.
Reason is, that script does not check validity of the portNum, which must be integer in range of 1..65535.
B. Cross-site scripting aka XSS:
B1 - XSS through unsanitaized user submitted variable "target"
http://localhost/nuke72/admin/modules/blocker_query.php?target=foobar.com">[xss code here]
B2 - XSS through unsanitaized user submitted variable "portNum"
http://localhost/nuke72/admin/modules/blocker_query.php?target=foobar.com&queryType=all&portNum=foobar[xss code here]
Greetings:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Greets to torufoorum members and to all bugtraq readers in Estonia! Tervitused!
Special greets to http://www.gamecheaters.us staff!
Contact:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
come2waraxe@yahoo.com
Janek Vind "waraxe"
Homepage: http://www.waraxe.us/
---------------------------------- [ EOF ] ------------------------------------
Copyright © by Waraxe IT Security Portal All Right Reserved.
Published on: 2005-01-06 (19357 reads)
[ Go Back ]