ezContents CMS Multiple Vulnerabilities

看板Bugtraq作者時間16年前 (2010/01/20 03:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
##########################www.BugReport.ir##################################= ###### # # AmnPardaz Security Research Team # # Title:=09=09ezContents CMS Multiple Vulnerabilities # Vendor:=09=09http://ezcontents.org/ # Vulnerable Version:=092.0.3 (and prior versions) # Exploitation:=09=09Remote with browser # Fix:=09=09=09N/A ############################################################################= ####### #################### - Description: #################### ezContents is a nice PHP CMS which allow management of dynamic =20 contents and web publishing. #################### - Vulnerability: #################### +--> SQL Injection Most of GET and POST parameters are not sanitized before being used in =20 SQL query. Vulnerable Pages/Affected Parameters: - 'admin/adminlogin.php'/'login' - 'bannerclick.php'/'id' - 'comments.php'/'article' - 'control.php'/'topgroupname' and 'groupname' - 'headeruserdata.php'/'topgroupname' and 'groupname' - 'login.php'/'subgroupname' and 'groupname' and 'topgroupname' and 'login= ' - 'menu.php'/'groupname' and 'topgroupname' - 'module.php'/'topgroupname' and 'groupname' - 'modules/diary/m_diaryform.php'/'DiaryID' - 'modules/diary/showdiary.php'/'month' and 'year' - 'modules/diary/showdiarydetail.php'/'diaryid' - 'modules/gallery/m_galleryform.php'/'galleryID' - 'modules/gallery/showgallerydetails.php'/'galleryid' - 'modules/links/m_linksform.php'/'GuestbookID' - 'modules/guestbook/m_guestbookform.php'/'LinkID' - 'modules/modfunctions.php'/'topgroupname' - 'modules/news/m_news.php'/'NewsID' - 'modules/news/shownewsdetails.php'/'newsid' - 'modules/poll/m_pollform.php'/'PollID' - 'modules/poll/m_polloptiondel.php'/'PollOptionID' - 'modules/poll/m_polloptions.php'/'PollID' - 'modules/poll/m_polloptionsform.php'/'PollOptionID' - 'modules/reviews/m_reviewsform.php'/'reviewsID' - 'modules/reviews/showreviewdetails.php'/'reviewsid' - 'printer.php'/'article' - 'rateit.php'/'article' - 'selectsite.php'/'Site' - 'selecttheme.php'/'Theme' - 'showcontents.php'/'groupname' and 'subgroupname' and 'topgroupname' - 'showdetails.php'/'contentname' - 'userinfo.php'/'topgroupname' +--> Authentication Bypass Authentication Bypass in 'comments.php'. No check for login performed. #################### - Exploits/PoCs: #################### =09The admin password can be extracted using timing attack. =09The general SQL Injection vector for exploiting login page =09is: =09 admin' AND IF(@Condition,BENCHMARK(1000000, md5(10)),2) OR '1'=3D'1 =09In the above vector @Condition can be replaced with any boolean =09experation and in case of true value page will have a sensible wait =09before starting transfer phase. =09For extracting password, we first find the length of password =09using 'length(userpassword)>**' as @Condition and binary search on =09** pass length. =09Then we can find i-th character of the password using =09"substring(userpassword,i,1) > '*'" as @Condition and binary search =09on the * as characters. #################### - Solution: #################### Edit the source code to ensure that inputs are properly sanitized. #################### - Original Advisory: #################### http://www.bugreport.ir/index_65.htm #################### - Credit: #################### AmnPardaz Security Research Team Contact: admin[4t}bugreport{d0t]ir www.BugReport.ir www.AmnPardaz.com
文章代碼(AID): #1BLW5kS_ (Bugtraq)