lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 10 Feb 2012 15:25:56 +0100
From: "research@...nerability-lab.com" <research@...nerability-lab.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Linux Kloxo LxCenter Server CP v6.1.10 - Multiple
	Web Vulnerabilities

Title:
======
Kloxo LxCenter Server CP v6.1.10 - Multiple Web Vulnerabilities


Date:
=====
2012-02-10


References:
===========
http://www.vulnerability-lab.com/get_content.php?id=429


VL-ID:
=====
429


Introduction:
=============
Scriptable, distributed and object oriented Hosting Platform. Manage
Clients, Resellers,
Domains, Backups, Stats, Mails and Databases. Manage everything!

(Copy of the Vendor Homepage: http://www.lxcenter.org/)


Abstract:
=========
Vulnerability-Lab Team  discovered multiple web vulnerabilities on
Kloxos LxCenter Server CP v6.1.10.


Report-Timeline:
================
2012-02-10:    Public or Non-Public Disclosure


Status:
========
Unpublished


Exploitation-Technique:
=======================
Remote


Severity:
=========
Medium


Details:
========
Multiple persistant input validation vulnerabilities are detected on
Kloxos LxCenter Server CP v6.1.10.
The bug allows remote attacker to implement malicious script code on the
application side (persistent).
Successful exploitation of the vulnerability allows an attacker to
manipulate modules/context (persistent) & can
lead to session hijacking (user/mod/admin).


Vulnerable Module(s):
                            [+] LocalHost {Command Center}
                            [+] Server > Information > Verbose Settings


Picture(s):
                            ../1.png
                            ../2.png


Proof of Concept:
=================
The vulnerabilities can be exploited by remote attackers with medium
required user inter action. For demonstration or reproduce ...

1.1
Localhost {Command Center}

<script> global_need_list = new Array(); </script><script>
global_match_list = new Array(); </script><script>
global_desc_list = new Array(); </script><form onsubmit=``return
check_for_needed_variables(`command_centerlocalhost`);``
method=``post`` enctype=``multipart/form-data`` action=``/display.php``
id=``command_centerlocalhost`` name=``command_centerlocalhost``>
<fieldset style=``background-color: rgb(255, 255, 255); border: 0px
none; padding: 10px;`` width=``90%``><legend style=``
font-weight: normal; border: 0px none;``><font color=``#303030``
style=``font-weight: bold;``>Command Center for localhost  
</font> </legend></fieldset>   <div align=``left``
style=``background-color: rgb(255, 255, 255); width: 90%;``><div align=``
left`` style=``width: 500px; border: 1px solid rgb(177, 192,
240);``><input type=``hidden`` value=``pserver``
name=``frm_o_o[0][class]``/>
 <input type=``hidden`` value=``localhost`` name=``frm_o_o[0][nname]``/>
 <div align=``left`` style=``padding: 10px; background-color: rgb(250,
248, 248); display: block;``> Command  <br/> 
... or
<input width=``60%`` type=``text`` value=``
name=``frm_pserver_c_ccenter_command``
class=``frm_pserver_c_ccenter_command textbox``/>
<iframe size=``30`` <``=`` [PERSISTENT SCRIPT CODE INJECT!]` src=``a``>
</div> <div align=left style=`padding:10 10 10 10 ;border-top
:1px solid #aaaaaa; background-color:#ffffff;display:block` > Output 
<br> <textarea nowrap  id=textarea_ class=
frmtextarea rows=10 style=`margin:0 0 0 50;width:85%;height:200px;`
name=`` size=30  ></textarea>
<script
type=``text/javascript``>createTextAreaWithLines(`textarea_`);</script>
<style>


1.2
Server => Information => 2 x Verbose Input

<font color=``#303030`` style=``font-weight: bold;``>Information for
localhost   </font> </legend></fieldset>  
<div align=``left`` style=``background-color: rgb(255, 255, 255); width:
90%;``><div align=``left`` style=``width: 500px; border: 1px
solid rgb(177, 192, 240);``><input type=``hidden`` value=``pserver``
name=``frm_o_o[0][class]``/>
 <input type=``hidden`` value=``localhost``
name=``frm_o_o[0][nname]``/>
 <script> global_need_list[`frm_pserver_c_description`] = `Verbose
Description (to Identify)`; </script>
<div align=``left`` style=``padding: 10px; background-color: rgb(250,
248, 248); display: block;``> Verbose Description (to Identify)
<font color=``red``><sup>*</sup></font> <br/> 
<input width=``60%`` type=``text`` [PERSISTENT SCRIPT CODE INJECT!]``
<iframe=`` value=``
>`` name=``frm_pserver_c_description`` class=``frm_pserver_c_description
textbox``/>``  size=``30``> </div> <div align=``left`` style=``
padding: 10px; border-top: 1px solid rgb(170, 170, 170);
background-color: rgb(255, 255, 255); display: block;``> FQDN Hostname 
<br/> 

<input width=``60%`` type=``text`` [PERSISTENT SCRIPT CODE INJECT!]``
<iframe=`` value=``>`` name=``frm_pserver_c_realhostname`` class=``
frm_pserver_c_realhostname textbox``/>``  size=``30``> </div> <div
align=``left`` style=``padding: 10px; border-top: 1px solid rgb(170,
170, 170); background-color: rgb(250, 248, 248); display: block;``> Load
Threshold At Which Warning Is Sent  <br/> 
<input width=``60%``
type=``text`` size=``30`` value=``20``
name=``frm_pserver_c_load_threshold``
class=``frm_pserver_c_load_threshold textbox``/> </div> <input type=
``hidden`` value=``update`` name=``frm_action``/>
 <input type=``hidden`` value=``information`` name=``frm_subaction``/>


Reference(s):
                ../command-center.txt
                ../server-verbose-input.txt


Risk:
=====
The security risk of the persistent input validation vulnerabilities is
estimated as medium(+).


Credits:
========
Vulnerability Research Laboratory   -    N/A  Anonymous


Disclaimer:
===========
The information provided in this advisory is provided as it is without
any warranty. Vulnerability-Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability
and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including
direct, indirect, incidental, consequential loss of business
profits or special damages, even if Vulnerability-Lab or its suppliers
have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability for
consequential or incidental damages so the foregoing limitation
may not apply. Any modified copy or reproduction, including partially
usages, of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its
unmodified form is granted. All other rights, including the use of
other media, are reserved by Vulnerability-Lab or its suppliers.

                            Copyright © 2012|Vulnerability-Lab




-- 
Website: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com
Contact: admin@...nerability-lab.com or support@...nerability-lab.com


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ