lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050515124251.11ED523D02@ws5-3.us4.outblaze.com>
Date: Sun May 15 13:51:07 2005
From: basher13 at linuxmail.org (eric basher)
Subject: Gurgens Guest Book Password Database Vulnerability

Update:
1:02 AM 5/13/2005


Subject:
" Gurgens Guest Book  Password Database Vulnerability "


Vulnerable version:
Guest Book 2.1 




Description:
Guest Book is a complete solution which requires none or very little effort to set up and 
match existing website configuration. Control Panel with "Virtual Designer" allows 
complete Guest Book  design build  on the client side  
The idea behind this ?Guest Book? is, to store message records in a text file. 
Although, compare to ADO, it's a bit complicated to retrieve and set individual 
records in the text file, this method seems to be quicker.Messages are stored in 
a text file ?guestrecord.txt?. This file if fully administrable through ?admin.asp ? 
page.  




Vulnerability:
The application has stored database for Administration  on the directory called
'db/',uses filetype .DAT extention as 'Genid.DAT'.The credentials are stored encrypted 
in another text file "Genid.dat".A vulnerability on this application
that make password can be take by browser(download),then use program encryption
to descrypt the password/username .The password and username was encrypted and 
save it as 'Genit.DAT'.

Sample source:

ElseIF flag = 1 then
	Set objFile = CreateObject("Scripting.FileSystemObject")
	Password = Trim(Request.form("Password"))
	UserID = Trim(Request.form("UserID"))
	passFile = server.mappath("db\Genid.dat")'A vulnerable line
	Set passGet=objFile.OpenTextFile(passFile, 1)


	DUserID = passGet.ReadLine
	DecryptUserID = CryptText(DUserID, "$u@...s", True)
	DPass = passGet.ReadLine 'String "$u@...s" is a crypt key
	DecryptPassword = CryptText(DPass, "$u@...s", True)
	passGet.Close


Here a vulnerable Administration Database;

passFile = server.mappath("db\Genid.dat")

Execute URL 'http://localhost/db/Genit.dat',then we go to download files
,use notepad to open file;

User name :
?????????????     <-------
                         |
Password =               |
????????          <------|
			 |
--------------------------
|
|
|
------ > 'Open 'Genid.dat' on directory 'db' ,
then use SEDT tools to sure descrypt the files 'Genit.dat'




Solution:
Modify or rename "db\Genid.dat" to another name,sample:
(..)
UserID = Trim(Request.form("UserID"))
passFile = server.mappath("db\Genid.dat")'A vulnerable line
'server.mappath("db\Genid.dat") modify to server.mappath("somepage\filename.dat")
(..)
Other else Change String "$u@...s" it at your will. But make sure it's the same 
on the "reset.asp" page.




Vendor URL:
http://www.gurgensvbstuff.com




Security Audit Tools:
http://user.7host.com/stardawn/files/sedt.zip




Credits:
Published by - basher13[basher13@...uxmail.org]

-- 
_______________________________________________
Check out the latest SMS services @ http://www.linuxmail.org
This allows you to send and receive SMS through your mailbox.

Powered by Outblaze

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ