lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 09 Feb 2012 09:04:56 -0500
From: Justin Klein Keane <justin@...irish.net>
To: Full Disclosure <full-disclosure@...ts.grok.org.uk>
Subject: Drupal Finder Module Multiple Vulnerabilities

Vulnerability Report

Description of Vulnerability:
-----------------------------
Drupal (http://drupal.org) is a robust content management system (CMS)
written in PHP and MySQL. The Drupal Finder module
(https://drupal.org/project/finder) "allows Drupal site administrators
to create flexible faceted search forms to find entities such as nodes
or users based on the values of fields and database attributes." The
Finder module contains multiple vulnerabilities including persistent
cross site scripting (XSS) and an arbitrary code execution
vulnerability.

Systems affected:
-----------------------------
Drupal 6.22 with Finder 6.x-1.9 was tested and shown to be vulnerable

Impact
-----------------------------
Users can execute code with the permissions of the web server. Malicious
users could inject arbitrary HTML into search results that could display
to all users.

Mitigating factors:
-----------------------------
In order to execute arbitrary code execution malicious users must have
the ability to import finders. In order to execute arbitrary script
injection malicious users must have the ability to create content.

Proof of Concept Exploit (Code Execution):
------------------------------------------
1.  Install and enable the Finder modules
2.  Enter '$a = phpinfo()' in the form at ?q=admin/build/finder/import
3.  Submit the form to view the executed code

Proof of Concept Exploit (XSS):
------------------------------------------
1.  Install and enable the Finder modules
2.  At ?q=node/add/story create a new node with the title
"<script>alert('xss');</script>" and save it
3.  Create a new "Node finder" using the drop down at the bottom of the
page ?q=admin/build/finder
4.  Check 'Provide block' and select "Autocomplete textfield" from the
'Add element' drop down
5.  Save the new finder using the button at the bottom of the form
6.  In the resulting configuration scree
(?q=admin/build/finder/X/edit/2/edit/ where X is the Finder ID) select
"Node:Title" from the 'Find items by this field:' select list and click
'Save finder element'
7.  Enable the new Finder block at ?q=admin/build/block
8.  Type 'xss' into the Finder block to view the rendered JavaScript

Vendor Response:
-----------------------------
Upgrade to the latest version of Finder. SA-CONTRIB-2012-017
(https://drupal.org/node/1432970)

Text of this advisory also available at 
http://www.madirish.net/content/drupal-finder-6x-19-xss-and-remote-code-execution-vulnerabilities

-- 
Justin Klein Keane
http://www.MadIrish.net



Download attachment "signature.asc" of type "application/pgp-signature" (447 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists