lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061128221714.4171.qmail@securityfocus.com>
Date: 28 Nov 2006 22:17:14 -0000
From: jesper.jurcenoks@...vigilance.com
To: bugtraq@...urityfocus.com
Subject: Monkey Boards version 0.3.5 Multiple Path Disclosure Vulnerabilities

netVigilance Security Advisory #9

Monkey Boards version 0.3.5 Multiple Path Disclosure Vulnerabilities 

Description:
Monkey Boards is a fully-featured message board system suitable for smaller web sites. Build a virtual online community where users can post and reply to anyone. It is coded in PHP and uses an SQLite database.  Due to program flaws it is possible for the remote attacker to disclose the true path of the server-side script.

External References: 
Mitre CVE: CVE-2006-6113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6113 
NVD NIST: CVE-2006-6113 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-6113 
OSVDB: 30683 http://www.osvdb.com/displayvuln.php?osvdb_id=30683
30684 http://www.osvdb.com/displayvuln.php?osvdb_id=30684

Summary: 
Monkey Boards is a fully-featured message board system suitable for smaller web sites. Build a virtual online community where users can post and reply to anyone. It is coded in PHP and uses an SQLite database. 
A security problem in the product allows attackers to gather the true path of the server-side script. 

Release Date:
November 28, 2006

Severity:
Risk: Low
 
CVSS Metrics
Access Vector: Remote
Access Complexity: Low
Authentication: not-required
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
Impact Bias: Normal
CVSS Base Score: 2.3
 
Target Distribution on Internet: Low
 
Exploitability: Functional Exploit
Remediation Level:  Official Fix
Report Confidence:  Confirmed
 
Vulnerability Impact: Attack
Host Impact: Path disclosure.

SecureScout Testcase ID:
TC 17939

Vulnerable Systems:
Monkeyboards 0.3.5 and earlier.

Vulnerability Type:
Program flaw – The admin_auth.inc.php and class.compiler.php scripts has flaws which lead to a Warning or even Fatal Errors.

Vendor Status: 
The Vendor has been notified. Project Administrator James Greenwood has released version 0.3.5a that fixes the problems. 
Please goto :  http://sourceforge.net/project/showfiles.php?group_id=165094 to download latest version.
Solution:
Upgrade to version 0.3.5a or above to remedy this problem.
Workaround:
Disable warning messages: modify in the php.ini file following line: display_errors = Off.
Or modify .htaccess file (this will work only for the apache servers). 
Example: 
HTTP REQUEST http://[TARGET]/[monkeyboards-directory]/include/engine/class.compiler.php
REPLY
...
<!--error--><br />
<b>Fatal error</b>:  Class template_lite_compiler:  Cannot inherit from undefined class template_lite in <b[FULL PATH TO FILE]class.compiler.php</b> on line <b>27</b><br />
<br />

... 

OR
HTTP REQUEST http://[TARGET]/[monkeyboards-directory]/include/admin_auth.inc.php
REPLY
...
<!--error--><br />
<b>Fatal error</b>:  Call to undefined function:  logged_in() in <b>[FULL PATH TO FILE]admin_auth.inc.php</b> on line <b>3</b><br />
...

URL of Original Advisory: http://www.netvigilance.com/advisory0009 


Credits: 
Jesper Jurcenoks
Co-founder netVigilance, Inc
www.netvigilance.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ