|
Message-ID: <1116306428.531624.1314732379386.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com> Date: Tue, 30 Aug 2011 15:26:19 -0400 (EDT) From: Josh Bressers <bressers@...hat.com> To: oss-security@...ts.openwall.com Cc: coley <coley@...re.org> Subject: Re: CVE Request: Jcow CMS 4.x:4.2 <= , 5.x:5.2 <= | Arbitrary Code Execution Please use CVE-2011-3203. Thanks. -- JB ----- Original Message ----- > Jcow CMS 4.x:4.2 <= , 5.x:5.2 <= | Arbitrary Code Execution > > > > 1. OVERVIEW > > Jcow CMS versions (4.x: 4.2 and lower, 5.x: 5.2 and lower) are > vulnerable to Arbitrary Code Execution. > > > 2. BACKGROUND > > Jcow is a flexible Social Networking software written in PHP. It can > help you to build a social network for your interests and passions, a > member community for your existing website and a social networking > site like facebook/myspace/twitter. > > > 3. VULNERABILITY DESCRIPTION > > The parameter "attachment" is not properly sanitized upon submission > to /index.php, which allows attacker to execute arbitrary PHP code of > his own. > > > 4. VERSIONS AFFECTED > > Free version: 4.x: 4.2 and lower > Commercial version: 5.x: 5.2 and lower > > > 5. PROOF-OF-CONCEPT/EXPLOIT > > http://dev.metasploit.com/redmine/attachments/1660/jcow_eval.rb > > jcow 4.2.1: > file: /includes/libs/ss.inc.php > line: 167 > > $app = $_POST['attachment']; > if (strlen($app) && $app != 'status') { > include_once('modules/'.$app.'/'.$app.'.php'); > $c_run = $app.'::ajax_post();'; > eval($c_run); > exit; > } > > > jcow 5.2.0: > file: /includes/libs/ss.inc.php > line: 45 > > $Vd2a57dc1 = $_POST['attachment']; if (strlen($Vd2a57dc1) && > $Vd2a57dc1 != 'status') { > include_once('modules/'.$Vd2a57dc1.'/'.$Vd2a57dc1.'.php'); $Ve8200cee > = $Vd2a57dc1.'::ajax_post();'; > eval($Ve8200cee); exit; } > > > > 6. SOLUTION > > Free version users can upgrade to 4.3.1 or higher. > Commercial users can upgrade to 5.3 or higher. > > > 7. VENDOR > > Jcow CMS Development Team > http://www.jcow.net > > > 8. CREDIT > > This vulnerability was discovered by Aung Khant, http://yehg.net, YGN > Ethical Hacker Group, Myanmar. > > > 9. DISCLOSURE TIME-LINE > > 2010-06-03: notified vendor > 2010-06-03: vendor replied fix would be available within 48hrs > 2011-08-24: vendor released fixed versions for 4.x and 5.x, > 4.3.1 for free release > 5.3 for commercial release > 2011-08-26: vulnerability disclosed > > > 10. REFERENCES > > Original Advisory URL: > http://yehg.net/lab/pr0js/advisories/[jcow_4.2,5.2]_arbitrary_code_execution > Jcow CMS: > http://sourceforge.net/projects/jcow/files/jcow4/jcow.4.2.1.zip/download > > > #yehg [2011-08-26] > > > --------------------------------- > Best regards, > YGN Ethical Hacker Group > Yangon, Myanmar > http://yehg.net > Our Lab | http://yehg.net/lab > Our Directory | http://yehg.net/hwd
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.