lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 28 Nov 2006 14:18:39 -0800
From: "Jesper Jurcenoks" <jesper.jurcenoks@...vigilance.com>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Monkey Boards version 0.3.5 Multiple Path
	Disclosure Vulnerabilities

netVigilance Security Advisory #9

Monkey Boards version 0.3.5 Multiple Path Disclosure Vulnerabilities 

Description:
Monkey Boards is a fully-featured message board system suitable for
smaller web sites. Build a virtual online community where users can post
and reply to anyone. It is coded in PHP and uses an SQLite database.
Due to program flaws it is possible for the remote attacker to disclose
the true path of the server-side script.

External References: 
Mitre CVE: CVE-2006-6113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6113 
NVD NIST: CVE-2006-6113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-6113 
OSVDB: 30683 http://www.osvdb.com/displayvuln.php?osvdb_id=30683
30684 http://www.osvdb.com/displayvuln.php?osvdb_id=30684

Summary: 
Monkey Boards is a fully-featured message board system suitable for
smaller web sites. Build a virtual online community where users can post
and reply to anyone. It is coded in PHP and uses an SQLite database. 
A security problem in the product allows attackers to gather the true
path of the server-side script. 

Release Date:
November 28, 2006

Severity:
Risk: Low
 
CVSS Metrics
Access Vector: Remote
Access Complexity: Low
Authentication: not-required
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
Impact Bias: Normal
CVSS Base Score: 2.3
 
Target Distribution on Internet: Low
 
Exploitability: Functional Exploit
Remediation Level:  Official Fix
Report Confidence:  Confirmed
 
Vulnerability Impact: Attack
Host Impact: Path disclosure.

SecureScout Testcase ID:
TC 17939

Vulnerable Systems:
Monkeyboards 0.3.5 and earlier.

Vulnerability Type:
Program flaw - The admin_auth.inc.php and class.compiler.php scripts has
flaws which lead to a Warning or even Fatal Errors.

Vendor Status: 
The Vendor has been notified. Project Administrator James Greenwood has
released version 0.3.5a that fixes the problems. 
Please goto :
http://sourceforge.net/project/showfiles.php?group_id=165094 to download
latest version.
Solution:
Upgrade to version 0.3.5a or above to remedy this problem.
Workaround:
Disable warning messages: modify in the php.ini file following line:
display_errors = Off.
Or modify .htaccess file (this will work only for the apache servers). 
Example: 
HTTP REQUEST
http://[TARGET]/[monkeyboards-directory]/include/engine/class.compiler.p
hp
REPLY
...
<!--error--><br />
<b>Fatal error</b>:  Class template_lite_compiler:  Cannot inherit from
undefined class template_lite in <b[FULL PATH TO
FILE]class.compiler.php</b> on line <b>27</b><br />
<br />

... 

OR
HTTP REQUEST
http://[TARGET]/[monkeyboards-directory]/include/admin_auth.inc.php
REPLY
...
<!--error--><br />
<b>Fatal error</b>:  Call to undefined function:  logged_in() in
<b>[FULL PATH TO FILE]admin_auth.inc.php</b> on line <b>3</b><br />
...

URL of Original Advisory: http://www.netvigilance.com/advisory0009 


Credits: 
Jesper Jurcenoks
Co-founder netVigilance, Inc
www.netvigilance.com
 
Jesper "JJ" Jurcenoks
Co-founder

netVigilance is a leading provider of IT-security software

jesper.jurcenoks@...vigilance.com

Phone: +1 503-524-5758
Fax: +1 503-214-8612

17937 SW McEwan Road Suite 250
Portland, Oregon 97224

For more information about netVigilance, visit www.netvigilance.com
<file:///C:/Documents%20and%20Settings/jju/Application%20Data/Microsoft/
Signatures/www.netvigilance.com>  


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ