lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4B70B66DA655F144855183C68062EE8901718ABC@trexchange.csnc.ch>
Date: Wed, 18 Dec 2013 09:25:29 +0100
From: "Alexandre Herzog" <alexandre.herzog@...c.ch>
To: <bugtraq@...urityfocus.com>
Subject: [CVE-2013-2627, CVE-2013-2628, CVE-2013-2629] Leed (Light Feed) - Multiple vulnerabilities

#############################################################
#
# COMPASS SECURITY ADVISORY
# http://www.csnc.ch/en/downloads/advisories.html
#
#############################################################
#
# Product:  Leed (Light Feed)
# Vendor:   Valentin CARRUESCO aka Idleman
# CSNC ID:  CSNC-2013-005 (SQL Injection), CSNC-2013-006 (CSRF), CSNC-2013-007 (Authentication Bypass)
# CVD ID:   CVE-2013-2627 (SQL Injection), CVE-2013-2628 (CSRF), CVE-2013-2629 (Authentication Bypass)
# Subject:  Multiple vulnerabilities (see above)
# Risk:     High
# Effect:   Remotely exploitable
# Author:   Alexandre Herzog <alexandre.herzog@...c.ch>
# Date:     18.12.2013
#
#############################################################


Introduction:
-------------
Leed is a lightweight RSS/ATOM aggregator based on PHP. It can be hosted 
on any server supporting PHP and aims to be an alternative to Google 
Reader and its substitutes. [1] 


 
Technical Description
---------------------

1. SQL injection (CSNC-2013-005 / CVE-2013-2627)
The SQL injection is within the ID parameter of 
leed/action.php?action=removeFolder&id=-1 as user input does not get 
properly escaped. Escaping is otherwise done consistently across the 
remaining of the audited code. Exploiting this issue is tricky due to 
the HTML encoding, but not impossible, e.g. 
If select @@version returns '5.0.84-log' on your database,
CAST(@@version as signed) will return 5
Injection parameter (before encoding) would e.g. be
IF(CAST(@@version as signed) in(5),BENCHMARK(2000000,SHA1(0)),-1)
This blind SQL will last ~5 seconds on my installation as the condition
is true. This way, you could extract information one by one from the
mysql tables.

2. Authorization bypasses in action.php (CSNC-2013-007 / CVE-2013-2629)
The following actions can be called anonymously, as the $myUser variable
isn't verified:
- importForm
- importFeed
- addFavorite
- removeFavorite

3. Missing anti cross-site request forgery token (CSNC-2013-006 / CVE-2013-2628)
None of the actions done within action.php requires a token to defeat CSRF.
This means malicious action can be executed under the identity of a logged
in Leed admin if the victim clicks on a malicious link or visits a website
under the attacker's control.


Workaround / Fix:
-----------------
Upgrade to the latest available version of Leed.


Timeline:
---------
2013-12-18:     Public disclosure date
2013-03-19:     GIT commit of the fixes
2013-03-19:     Initial vendor response
2013-03-19:     Discovery by Alexandre Herzog & initial vendor notification


References:
-----------
[1] http://projet.idleman.fr/leed/

--
Alexandre Herzog, IT Security Analyst, Compass Security AG
Werkstrasse 20, 8645 Jona, Switzerland
Schauplatzgasse 39, 3011 Bern, Switzerland
Tel: +41 55 214 41 66
http://www.csnc.ch/



Download attachment "smime.p7s" of type "application/x-pkcs7-signature" (5234 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ