lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <001f01cfe726$59d09890$0d71c9b0$@oststrom.com>
Date: Mon, 13 Oct 2014 22:43:16 +0200
From: "oststrom \(public\)" <pub@...strom.com>
To: <fulldisclosure@...lists.org>
Subject: [FD] CVE-2014-2023 - Tapatalk for vBulletin 4.x - multiple blind
	sql injection (pre-auth)

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

*Preliminary VulnNote*

 

CVE-2014-2023 - Tapatalk for vbulletin 4.x - multiple blind sql injection
(pre-auth)

============================================================================
========

 

Overview

- --------

 

    date    :  10/12/2014   

    cvss    :  7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N) base  

    cwe     :  89   

    

    vendor  :  Tapatalk Inc  

    product :  Tapatalk for vBulletin 4.x   

    versions affected:    latest (to date)

                        5.2.1    (verified)

                        4.9.0     (verified)

                        

    exploitability :

                * remotely exploitable

                * NO authentication required

                * NO user interaction required

                * NO special configuration required (default settings)

                

Abstract

- ---------

    Tapatalk for vBulletin 4.x does not properly sanitize some xmlrpc calls 

    allowing unauthenticated users to inject arbitrary SQL commands.

    

    risk: high

    

    !! Note !! - this is a preliminary VulnNote. The full PoC / Description
will

    be made available within the next 7 days (see contact) to allow mobiquo
to 

    fix this.

    

    googledork: see PoC code

 

 

Details

- --------

    

    vulnerable component: 

        * stripped // see full VulnNote - (contact)

    xmlrpc request is decoded, decoded attacker provided values are directly

    being used in sql query.

 

 

Proof of Concept (PoC)

- ----------------------

 

    see https://github.com/tintinweb/pub/cve-2013-2023

    

    

    1) prerequesites

         vBulletin 4.x with Tapatalk for vBulletin 4.x installed

    2) run PoC

         edit PoC to match your TARGET (, optionally DEBUG=True)

         (optionally) edit your query to extract specific database values

         Note: PoC will try to detect tapatalk on that host

         run PoC

        

    by default extracts

    * mysql root hash (in case vBulletin db user has permissions to do so)

    * vbulletin db record fields (apikey) - perfectly chains with
CVE-2014-2023

    

    only limited by the vBulletin db_user access permissions

    

    

Timeline

- --------

 

    2014-01-14: initial vendor contact, no response

    2014-02-24: vendor contact, no response

    2014-10-13: public disclosure

    

Contact

- --------

    tintinweb - https://github.com/tintinweb/pub/cve-2013-2023

    

    

(0x721427D8)

    

    

-----BEGIN PGP SIGNATURE-----

iQIcBAEBAgAGBQJUPDjXAAoJEBgB43t1YjbLV+8P/0PiBwY4VL1PRzOaczzG3nX5

EEWIT/qNU9btlZ+aLiU3fpp7a5FIOMoAVcmGHDduVLifQe6WHmS7FdDfYgBDl0uT

b4L5zjPK1rDFHVxIWtRM5P4NpahE4ZItPQ1SMLmsAl6k3Vc7tM/ylHzh/Re/IuzM

xxLe3yXlMq7AV4u04MxxLNH/qc+pn2HLM+Q16tQvxLXHPXelwQ33BmAQdimUSg46

KVe2SZG37XAi7eR5HUnpykTVz57ZmqZBya6+VKXdO6Y1RuUYfmUjH1UzdHU1mV6K

KPr6PKeeVXBMf9QshLcSaEI33piYVqyk+Z1CtablfCtPemNBazTWRdKaorgrbpIT

pWoN9LpuJqRZLDmYfPf76KoxqeFjZKUnBwCyeNLJbAoxf+O8ZVMSf4Ig4oGTEgsc

l3y1XxYKpfwfuu4MxS9pyFPBAugdPXxd7JjRRhLot96/ZtH256nkgzLS0KkiqDSI

7AHNEQPhiZTAwf+Y1upRip2ZY4eTF1xPMNqrAUZtZXhqiDHZ1C8+pMI/baUcHsQc

4mMyVoISCyFUHEmqdM25rkCZNFj5PooFRKRgZJIqrzOXp5EqZ0kAmMOakvFeP76f

vGBpRhjbr0+7m50Q9beC86Dx/4nMTwaksMY4e09T/0WrNkVXjs4Wh83czK3SFR1E

n48luoNydVPisxHGQpRS

=Zjgy

-----END PGP SIGNATURE-----


_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ