lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <25962.1026480475@www9.gmx.net>
From: avart at gmx.de (avart@....de)
Subject: Several problems in CARE 2002

Several problems in CARE 2002
-------------------------------------

# What is CARE 2002?
CARE 2002 is a free software package for hospitals. It's based on php +
mysql. For further information visit <http://www.care2x.com/>.


#### include + NULL problem  ####
# Problem description 
There are several include statements which use variables passed by
the user. So if register_globals is on and magic_quotes_gpc is off you
are able to read any file on the webserver:
./main/cafenews.php:
[...]
include("../language/".$lang."/lang_".$lang."_newsdummy.php");
[...]

If $lang contains NULL (aka \0 or %00) the include statement ignores
everything after the NULL and includes the file.
Here's some metacode explaining the behavior:

foobar.php looks like this:
<?php
include("../".$input."blubb");
?>

Calling the file with the following parameter:
foobar.php?input=bla%00bla

results in (with enabled magic_quotes_gcp):
<br />
<b>Warning</b>:  Failed opening '../bla\0blablubb' for inclusion
(include_path='.:/usr/local/lib/php') in <b>/home/user/public_html/foobar.php</b> on
line
<b>2</b><br />

This doesn't seem to be exploitable, but what happens, if magic_quotes_gcp
is turned off (like on php.ini-recommened, for performance reasons, without
pointing to THIS kind of problem)?:
<br />
<b>Warning</b>:  Failed opening '../bla' for inclusion
(include_path='.:/usr/local/lib/php') in <b>/home/user/public_html/foobar.php</b> on line
<b>2</b><br />

Huh?! Did you get it? Everything after NULL (%00) is ignored!
So what can we do now? We can take a look at the avaiable users:
foobar.php?input=../../../etc/passwd%00

Voila...
You can open every file you want. Ok, not every file. It has to be
readable by the http-user, like wwwrun or www.

# And the solution? 
One can test, if a file exists with the function file_exists(). This
function doesn't ignore the characters after NULL.
On the other side, one could try to avoid using userdata to open a file.

In CARE 2002 and other webapps, you are often faced to this kind of
problem while handling language or themes files.

# Fix?
The authors will release a new version (1.0.0.2) at
<http://www.care2x.com/>.
The best way for a admin is, to enable magic_quotes_gpc and/or other
security related options in php. For further information take a look at:
<http://php.net/security> .
Other options, like enable_safe_mode or open_base_dir helps you too, to
keep your server privacy if you can't trust the executed phpcode.

#### missing addslashes() ####

# Problem description
None of the data passed (there are just a few exeptions) to the mysqld
is checked for control characters like ', " et al.
So one is able to commit injected sql queries.
The problem exists, when magic_quotes_gpc is turned off.

For further information about dangerous sql queries
see:
*<http://www.php.net/manual/en/security.database.php#security.database.sql-injection>.
* <http://www.google.com/search?q=sql+injection+problem>

# And the solution?
One can use addslashes() for _every_ data a user enters and is submitted
to the database.
Lazy people hope, that magic_quotes_gpc is enabled. Never expect, that  an
admin configured a webserver correct, try to start the security at
application level.

# Fix?
Within the new release, the author fixed the problems.
Turn magic_quotes_qpc on!


##### Credits #####
Thanks skyp, for cross reading the text.
For the german-speaking folk: <http://bluephod.net/>
Sorry for the broken lines I hate webmailer :).

-- 
GMX - Die Kommunikationsplattform im Internet.
http://www.gmx.net


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ