[<prev] [next>] [day] [month] [year] [list]
Message-ID: <66AC942972DC7E4F89920985708D862F49BC7D@beaverton.portland.netvigilance.com>
Date: Tue, 28 Nov 2006 14:18:39 -0800
From: "Jesper Jurcenoks" <jesper.jurcenoks@...vigilance.com>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Monkey Boards version 0.3.5 Multiple Path
Disclosure Vulnerabilities
netVigilance Security Advisory #9
Monkey Boards version 0.3.5 Multiple Path Disclosure Vulnerabilities
Description:
Monkey Boards is a fully-featured message board system suitable for
smaller web sites. Build a virtual online community where users can post
and reply to anyone. It is coded in PHP and uses an SQLite database.
Due to program flaws it is possible for the remote attacker to disclose
the true path of the server-side script.
External References:
Mitre CVE: CVE-2006-6113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6113
NVD NIST: CVE-2006-6113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-6113
OSVDB: 30683 http://www.osvdb.com/displayvuln.php?osvdb_id=30683
30684 http://www.osvdb.com/displayvuln.php?osvdb_id=30684
Summary:
Monkey Boards is a fully-featured message board system suitable for
smaller web sites. Build a virtual online community where users can post
and reply to anyone. It is coded in PHP and uses an SQLite database.
A security problem in the product allows attackers to gather the true
path of the server-side script.
Release Date:
November 28, 2006
Severity:
Risk: Low
CVSS Metrics
Access Vector: Remote
Access Complexity: Low
Authentication: not-required
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
Impact Bias: Normal
CVSS Base Score: 2.3
Target Distribution on Internet: Low
Exploitability: Functional Exploit
Remediation Level: Official Fix
Report Confidence: Confirmed
Vulnerability Impact: Attack
Host Impact: Path disclosure.
SecureScout Testcase ID:
TC 17939
Vulnerable Systems:
Monkeyboards 0.3.5 and earlier.
Vulnerability Type:
Program flaw - The admin_auth.inc.php and class.compiler.php scripts has
flaws which lead to a Warning or even Fatal Errors.
Vendor Status:
The Vendor has been notified. Project Administrator James Greenwood has
released version 0.3.5a that fixes the problems.
Please goto :
http://sourceforge.net/project/showfiles.php?group_id=165094 to download
latest version.
Solution:
Upgrade to version 0.3.5a or above to remedy this problem.
Workaround:
Disable warning messages: modify in the php.ini file following line:
display_errors = Off.
Or modify .htaccess file (this will work only for the apache servers).
Example:
HTTP REQUEST
http://[TARGET]/[monkeyboards-directory]/include/engine/class.compiler.p
hp
REPLY
...
<!--error--><br />
<b>Fatal error</b>: Class template_lite_compiler: Cannot inherit from
undefined class template_lite in <b[FULL PATH TO
FILE]class.compiler.php</b> on line <b>27</b><br />
<br />
...
OR
HTTP REQUEST
http://[TARGET]/[monkeyboards-directory]/include/admin_auth.inc.php
REPLY
...
<!--error--><br />
<b>Fatal error</b>: Call to undefined function: logged_in() in
<b>[FULL PATH TO FILE]admin_auth.inc.php</b> on line <b>3</b><br />
...
URL of Original Advisory: http://www.netvigilance.com/advisory0009
Credits:
Jesper Jurcenoks
Co-founder netVigilance, Inc
www.netvigilance.com
Jesper "JJ" Jurcenoks
Co-founder
netVigilance is a leading provider of IT-security software
jesper.jurcenoks@...vigilance.com
Phone: +1 503-524-5758
Fax: +1 503-214-8612
17937 SW McEwan Road Suite 250
Portland, Oregon 97224
For more information about netVigilance, visit www.netvigilance.com
<file:///C:/Documents%20and%20Settings/jju/Application%20Data/Microsoft/
Signatures/www.netvigilance.com>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists